Start your free trial today.
Protect your organization with cutting-edge cybersecurity solutions designed for resilience and efficiency. Secure your digital assets with confidence.
Your Shield Against Threats
Unleash the Power of Cybersecurity
Boost Your Security, Enhance Your Business
We solve Your Cyber Challenges
Quick Links
Resources
Deepaegis Portals
2025 Deepaegis. All Rights Reserved.
A vulnerability in GNU Coreutils sort command allows a heap buffer under-read when a specially crafted input is used with traditional key format. This may lead to crashes or minor data leakage.
Can cause denial-of-service through application crash May expose one byte of memory (low confidentiality impact) Does not allow code execution, privilege escalation, or integrity compromise
GNU Coreutils (in Red Hat products like RHEL 8, 9, 10)
Affected Version: RHEL 8, 9, 10 (Coreutils)
Remediation: No immediate fix available Fix status: Deferred by Red Hat Default OS protections (SELinux, ASLR) reduce exploitability
Fix is deferred for RHEL 8/9/10 and OpenShift 4
Avoid using sort with traditional key format and unusually high field positions
Ensure SELinux and ASLR are enabled Monitor usage of sort commands from untrusted sources
Audit unusual sort usage in logs Use memory protection tools or ASAN builds for debugging
5/26/2025
Not specified
No affected organizations specified
This document contains sensitive information. Unauthorized distribution is prohibited.