Search for packages
| purl | pkg:deb/debian/coreutils@0?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1qcm-qjr7-ubfq | coreutils: segfault in uniq with long line input |
CVE-2013-0222
|
| VCID-bwmh-zthe-w3af | coreutils: segfault in "join -i" with long line input |
CVE-2013-0223
|
| VCID-jc69-qd3g-wyfb | coreutils: heap buffer overflow in sort(1) keycompare_mb() |
CVE-2015-4041
|
| VCID-jw45-7h3j-mka1 | coreutils: Unsafe temporary directory use in "distcheck" rule |
CVE-2009-4135
|
| VCID-tkur-hbfk-2ubx | coreutils: segfault in "sort -d" and "sort -M" with long line input |
CVE-2013-0221
|
| VCID-xpsk-xpxd-s7dn | A vulnerability has been discovered in Coreutils, which can lead to a heap buffer overflow and possibly aribitrary code execution. |
CVE-2024-0684
|
| VCID-ykcg-vgpb-aqah | coreutils: possible buffer overflow in keycompare_mb() |
CVE-2015-4042
|