Coreutils: Arbitrary code execution A vulnerability in Coreutils could lead to the execution of arbitrary code or a Denial of Service condition. coreutils 2016-12-08 2016-12-08 530514 local, remote 8.23 8.23

The GNU Core Utilities are the basic file, shell and text manipulation utilities of the GNU operating system.

A memory corruption flaw in GNU Coreutils’ parse_datetime function was reported. Applications using parse_datetime(), such as touch or date, may accepted untrusted input.

A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition.

There is no known workaround at this time.

All Coreutils users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/coreutils-8.23"
CVE-2014-9471 b-man whissi