Search CVE reports


Toggle filters

51 – 60 of 64 results


CVE-2015-1865

Low priority
Ignored

fts.c in coreutils 8.4 allows local users to delete arbitrary files.

1 affected package

coreutils

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
coreutils
Show less packages

CVE-2016-2781

Low priority
Ignored

chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

1 affected package

coreutils

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
coreutils Ignored Ignored Ignored Ignored
Show less packages

CVE-2016-7545

Medium priority
Ignored

SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.

1 affected package

policycoreutils

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
policycoreutils Not affected
Show less packages

CVE-2014-9471

Medium priority
Fixed

The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the...

1 affected package

coreutils

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
coreutils
Show less packages

CVE-2014-3215

Medium priority
Ignored

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it...

1 affected package

policycoreutils

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
policycoreutils
Show less packages

CVE-2013-0223

Medium priority
Not affected

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers...

1 affected package

coreutils

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
coreutils
Show less packages

CVE-2013-0222

Medium priority
Not affected

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in...

1 affected package

coreutils

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
coreutils
Show less packages

CVE-2013-0221

Medium priority
Not affected

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which...

1 affected package

coreutils

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
coreutils
Show less packages

CVE-2011-1011

Low priority
Ignored

The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and earlier in Red Hat Enterprise Linux (RHEL) 6 and earlier, and Fedora 14 and earlier, mounts a new directory...

1 affected package

policycoreutils

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
policycoreutils Not affected
Show less packages

CVE-2009-4135

Low priority

Some fixes available 1 of 12

The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.

1 affected package

coreutils

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
coreutils
Show less packages