coreutils: CVE-2024-0684: heap overflow in split --line-bytes with very long lines

Related Vulnerabilities: CVE-2024-0684  

Debian Bug report logs - #1061138
coreutils: CVE-2024-0684: heap overflow in split --line-bytes with very long lines

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 19 Jan 2024 05:21:01 UTC

Severity: grave

Tags: security, upstream

Found in version coreutils/9.4-3

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Michael Stone <mstone@debian.org>:
Bug#1061138; Package src:coreutils. (Fri, 19 Jan 2024 05:21:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Michael Stone <mstone@debian.org>. (Fri, 19 Jan 2024 05:21:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: coreutils: CVE-2024-0684: heap overflow in split --line-bytes with very long lines
Date: Fri, 19 Jan 2024 06:17:32 +0100
Source: coreutils
Version: 9.4-3
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for coreutils.

CVE-2024-0684[0]:
| heap overflow in split --line-bytes with very long lines

Note, the severity is choosen as such to make sure the fix lands in
trixie, but is slight overrated. If you feel strong on it feel free to
downgrade.

The issue can be reproduced with:

    { printf '%131070s\n' ''; printf 'x\n'; printf '%131071s\n' ''; } > in
    split -C 131072 ---io=131072 in

and only affects trixie and unstable version of split.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-0684
    https://www.cve.org/CVERecord?id=CVE-2024-0684
[1] https://www.openwall.com/lists/oss-security/2024/01/18/2

Regards,
Salvatore



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Fri Jan 19 08:20:35 2024; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.