Debian Package Tracker
Register | Log in
Subscribe

coreutils

GNU core utilities

Choose email to subscribe with

general
  • source: coreutils (main)
  • version: 9.1-1
  • maintainer: Michael Stone (DMD)
  • arch: any
  • std-ver: 4.5.0
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 8.26-3
  • oldstable: 8.30-3
  • stable: 8.32-4
  • testing: 9.1-1
  • unstable: 9.1-1
versioned links
  • 8.26-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.30-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.32-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 9.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • coreutils (363 bugs: 0, 192, 171, 0)
action needed
A new upstream version is available: 9.2 high
A new upstream version 9.2 is available, you should consider packaging it.
Created: 2023-03-24 Last update: 2023-03-29 20:05
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2016-2781: chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Created: 2022-07-04 Last update: 2023-03-27 11:06
lintian reports 18 errors and 2 warnings high
Lintian reports 18 errors and 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-09-25 Last update: 2023-02-18 12:36
14 bugs tagged patch in the BTS normal
The BTS contains patches fixing 14 bugs (15 if counting merged bugs), consider including or untagging them.
Created: 2022-07-27 Last update: 2023-03-29 20:00
debian/patches: 3 patches to forward upstream low

Among the 3 debian patches available in version 9.1-1 of the package, we noticed the following issues:

  • 3 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-26 15:54
No known security issue in bullseye wishlist

There is 1 open security issue in bullseye.

1 ignored issue:
  • CVE-2016-2781: chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Created: 2022-07-04 Last update: 2023-03-27 11:06
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.5.0).
Created: 2020-11-17 Last update: 2022-12-17 19:18
news
[rss feed]
  • [2022-10-01] coreutils 9.1-1 MIGRATED to testing (Debian testing watch)
  • [2022-09-20] Accepted coreutils 9.1-1 (source) into unstable (Michael Stone)
  • [2021-11-08] coreutils 8.32-4.1 MIGRATED to testing (Debian testing watch)
  • [2021-11-02] Accepted coreutils 8.32-4.1 (source) into unstable (Johannes Schauer Marin Rodrigues)
  • [2020-10-02] coreutils 8.32-4 MIGRATED to testing (Debian testing watch)
  • [2020-09-22] Accepted coreutils 8.32-4 (source amd64) into unstable (Michael Stone)
  • [2020-07-20] Accepted coreutils 8.32-3 (source amd64) into unstable (Michael Stone)
  • [2020-06-23] Accepted coreutils 8.32-2 (source amd64) into unstable (Michael Stone)
  • [2020-06-22] Accepted coreutils 8.32-1 (source amd64) into unstable (Michael Stone)
  • [2019-03-06] coreutils 8.30-3 MIGRATED to testing (Debian testing watch)
  • [2019-02-28] Accepted coreutils 8.30-3 (source amd64) into unstable (Michael Stone)
  • [2019-02-26] Accepted coreutils 8.30-2 (source amd64) into unstable (Michael Stone)
  • [2018-09-09] coreutils 8.30-1 MIGRATED to testing (Debian testing watch)
  • [2018-08-29] Accepted coreutils 8.30-1 (source amd64) into unstable (Michael Stone)
  • [2017-10-13] coreutils 8.28-1 MIGRATED to testing (Debian testing watch)
  • [2017-10-02] Accepted coreutils 8.28-1 (source amd64) into unstable (Michael Stone)
  • [2017-03-05] coreutils 8.26-3 MIGRATED to testing (Debian testing watch)
  • [2017-02-22] Accepted coreutils 8.26-3 (source amd64 all) into unstable (Michael Stone)
  • [2017-01-29] coreutils 8.26-2 MIGRATED to testing (Debian testing watch)
  • [2017-01-20] Accepted coreutils 8.26-2 (source amd64 all) into unstable (Michael Stone)
  • [2016-12-20] coreutils 8.26-1 MIGRATED to testing (Debian testing watch)
  • [2016-12-09] Accepted coreutils 8.26-1 (source amd64 all) into unstable (Michael Stone)
  • [2016-02-27] coreutils 8.25-2 MIGRATED to testing (Debian testing watch)
  • [2016-02-17] Accepted coreutils 8.25-2 (source amd64 all) into unstable (Michael Stone)
  • [2016-01-29] Accepted coreutils 8.25-1 (source amd64 all) into unstable (Michael Stone)
  • [2016-01-29] coreutils 8.24-1 MIGRATED to testing (Debian testing watch)
  • [2016-01-18] Accepted coreutils 8.24-1 (source amd64 all) into unstable (Michael Stone)
  • [2015-03-20] coreutils 8.23-4 MIGRATED to testing (Britney)
  • [2015-03-14] Accepted coreutils 8.23-4 (source all amd64) into unstable (Michael Stone)
  • [2014-11-09] coreutils 8.23-3 MIGRATED to testing (Britney)
  • 1
  • 2
bugs [bug history graph]
  • all: 364 377
  • RC: 0
  • I&N: 189 195
  • M&W: 175 182
  • F&P: 0
  • patch: 14 15
links
  • lintian (18, 2)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 68)
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 9.1-1ubuntu2
  • 165 bugs (8 patches)
  • patches for 9.1-1ubuntu2

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing