A vulnerability in Coreutils could lead to the execution of arbitrary code or a Denial of Service condition.
Package | sys-apps/coreutils on all architectures |
---|---|
Affected versions | < 8.23 |
Unaffected versions | >= 8.23 |
The GNU Core Utilities are the basic file, shell and text manipulation utilities of the GNU operating system.
A memory corruption flaw in GNU Coreutils’ parse_datetime function was reported. Applications using parse_datetime(), such as touch or date, may accepted untrusted input.
A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition.
There is no known workaround at this time.
All Coreutils users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/coreutils-8.23"
Release date
December 08, 2016
Latest revision
December 08, 2016: 1
Severity
normal
Exploitable
local, remote
Bugzilla entries