Slackware Linux 15.0 / current coreutils Vulnerability (SSA:2024-088-03)

medium Nessus Plugin ID 192678


The remote Slackware Linux host is missing a security update to coreutils.


The version of coreutils installed on the remote host is prior to 9.5. It is, therefore, affected by a vulnerability as referenced in the SSA:2024-088-03 advisory.

- A flaw was found in the GNU coreutils split program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service. (CVE-2024-0684)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade the affected coreutils package.

See Also

Plugin Details

Severity: Medium

ID: 192678

File Name: Slackware_SSA_2024-088-03.nasl

Version: 1.0

Type: local

Published: 3/29/2024

Updated: 3/29/2024

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2024-0684


Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:coreutils, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:15.0

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Exploit Ease: No known exploits are available

Patch Publication Date: 3/28/2024

Vulnerability Publication Date: 1/18/2024

Reference Information

CVE: CVE-2024-0684