Lucene search

K
gentooGentoo FoundationGLSA-202407-16
HistoryJul 05, 2024 - 12:00 a.m.

GNU Coreutils: Buffer Overflow Vulnerability

2024-07-0500:00:00
Gentoo Foundation
security.gentoo.org
8
gnu core utilities
split program
buffer overflow

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

8.3

Confidence

Low

Background

The GNU Core Utilities are the basic file, shell and text manipulation utilities of the GNU operating system.

Description

A vulnerability has been discovered in the Coreutils “split” program that can lead to a heap buffer overflow and possibly arbitrary code execution.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All Coreutils users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/coreutils-9.4-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-apps/coreutils< 9.4-r1UNKNOWN

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

8.3

Confidence

Low