Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2024-0684

Disclosure Date: February 06, 2024 (last updated April 19, 2024)
A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.
Attacker Value
Unknown

CVE-2015-4042

Disclosure Date: January 24, 2020 (last updated February 21, 2025)
Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings.
Attacker Value
Unknown

CVE-2015-4041

Disclosure Date: January 24, 2020 (last updated February 21, 2025)
The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.
Attacker Value
Unknown

CVE-2017-18018

Disclosure Date: January 04, 2018 (last updated November 26, 2024)
In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.
0
Attacker Value
Unknown

CVE-2015-1865

Disclosure Date: September 20, 2017 (last updated November 26, 2024)
fts.c in coreutils 8.4 allows local users to delete arbitrary files.
0
Attacker Value
Unknown

CVE-2016-2781

Disclosure Date: February 07, 2017 (last updated November 08, 2023)
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
0
Attacker Value
Unknown

CVE-2014-9471

Disclosure Date: January 16, 2015 (last updated October 05, 2023)
The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command.
0
Attacker Value
Unknown

CVE-2014-3215

Disclosure Date: May 08, 2014 (last updated October 05, 2023)
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
0
Attacker Value
Unknown

CVE-2011-1011

Disclosure Date: February 24, 2011 (last updated October 04, 2023)
The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and earlier in Red Hat Enterprise Linux (RHEL) 6 and earlier, and Fedora 14 and earlier, mounts a new directory on top of /tmp without assigning root ownership and the sticky bit to this new directory, which allows local users to replace or delete arbitrary /tmp files, and consequently cause a denial of service or possibly gain privileges, by running a setuid application that relies on /tmp, as demonstrated by the ksu application.
0
Attacker Value
Unknown

CVE-2009-4135

Disclosure Date: December 11, 2009 (last updated October 04, 2023)
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
0