Vulnerabilities > GNU > Coreutils > Medium

DATE CVE VULNERABILITY TITLE RISK
2024-02-06 CVE-2024-0684 Out-of-bounds Write vulnerability in GNU Coreutils 9.2/9.3/9.4
A flaw was found in the GNU coreutils "split" program.
local
low complexity
gnu CWE-787
5.5
2020-01-24 CVE-2015-4041 Out-of-bounds Write vulnerability in GNU Coreutils 8.23
The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.
local
low complexity
gnu CWE-787
4.6
2017-02-07 CVE-2016-2781 Improper Input Validation vulnerability in GNU Coreutils
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
local
low complexity
gnu CWE-20
6.5
2008-07-28 CVE-2008-1946 Permissions, Privileges, and Access Controls vulnerability in GNU Coreutils 5.2.1
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.
local
gnu CWE-264
4.4