Debian Package Tracker
Register | Log in
Subscribe

coreutils

GNU core utilities

Choose email to subscribe with

general
  • source: coreutils (main)
  • version: 8.32-4.1
  • maintainer: Michael Stone (DMD)
  • arch: any
  • std-ver: 4.5.0
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 8.26-3
  • oldstable: 8.30-3
  • stable: 8.32-4
  • testing: 8.32-4.1
  • unstable: 8.32-4.1
versioned links
  • 8.26-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.30-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.32-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.32-4.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • coreutils (342 bugs: 0, 168, 174, 0)
action needed
A new upstream version is available: 9.1 high
A new upstream version 9.1 is available, you should consider packaging it.
Created: 2021-09-28 Last update: 2022-08-18 17:42
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2016-2781: chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Created: 2022-07-04 Last update: 2022-08-01 13:40
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2016-2781: chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Created: 2022-07-04 Last update: 2022-08-01 13:40
15 bugs tagged patch in the BTS normal
The BTS contains patches fixing 15 bugs (16 if counting merged bugs), consider including or untagging them.
Created: 2022-07-27 Last update: 2022-08-18 23:30
No known security issue in bullseye wishlist

There is 1 open security issue in bullseye.

1 ignored issue:
  • CVE-2016-2781: chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Created: 2022-07-04 Last update: 2022-08-01 13:40
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.0).
Created: 2020-11-17 Last update: 2022-05-11 23:24
news
[rss feed]
  • [2021-11-08] coreutils 8.32-4.1 MIGRATED to testing (Debian testing watch)
  • [2021-11-02] Accepted coreutils 8.32-4.1 (source) into unstable (Johannes Schauer Marin Rodrigues)
  • [2020-10-02] coreutils 8.32-4 MIGRATED to testing (Debian testing watch)
  • [2020-09-22] Accepted coreutils 8.32-4 (source amd64) into unstable (Michael Stone)
  • [2020-07-20] Accepted coreutils 8.32-3 (source amd64) into unstable (Michael Stone)
  • [2020-06-23] Accepted coreutils 8.32-2 (source amd64) into unstable (Michael Stone)
  • [2020-06-22] Accepted coreutils 8.32-1 (source amd64) into unstable (Michael Stone)
  • [2019-03-06] coreutils 8.30-3 MIGRATED to testing (Debian testing watch)
  • [2019-02-28] Accepted coreutils 8.30-3 (source amd64) into unstable (Michael Stone)
  • [2019-02-26] Accepted coreutils 8.30-2 (source amd64) into unstable (Michael Stone)
  • [2018-09-09] coreutils 8.30-1 MIGRATED to testing (Debian testing watch)
  • [2018-08-29] Accepted coreutils 8.30-1 (source amd64) into unstable (Michael Stone)
  • [2017-10-13] coreutils 8.28-1 MIGRATED to testing (Debian testing watch)
  • [2017-10-02] Accepted coreutils 8.28-1 (source amd64) into unstable (Michael Stone)
  • [2017-03-05] coreutils 8.26-3 MIGRATED to testing (Debian testing watch)
  • [2017-02-22] Accepted coreutils 8.26-3 (source amd64 all) into unstable (Michael Stone)
  • [2017-01-29] coreutils 8.26-2 MIGRATED to testing (Debian testing watch)
  • [2017-01-20] Accepted coreutils 8.26-2 (source amd64 all) into unstable (Michael Stone)
  • [2016-12-20] coreutils 8.26-1 MIGRATED to testing (Debian testing watch)
  • [2016-12-09] Accepted coreutils 8.26-1 (source amd64 all) into unstable (Michael Stone)
  • [2016-02-27] coreutils 8.25-2 MIGRATED to testing (Debian testing watch)
  • [2016-02-17] Accepted coreutils 8.25-2 (source amd64 all) into unstable (Michael Stone)
  • [2016-01-29] Accepted coreutils 8.25-1 (source amd64 all) into unstable (Michael Stone)
  • [2016-01-29] coreutils 8.24-1 MIGRATED to testing (Debian testing watch)
  • [2016-01-18] Accepted coreutils 8.24-1 (source amd64 all) into unstable (Michael Stone)
  • [2015-03-20] coreutils 8.23-4 MIGRATED to testing (Britney)
  • [2015-03-14] Accepted coreutils 8.23-4 (source all amd64) into unstable (Michael Stone)
  • [2014-11-09] coreutils 8.23-3 MIGRATED to testing (Britney)
  • [2014-10-30] Accepted coreutils 8.23-3 (source all amd64) into unstable (Michael Stone)
  • [2014-09-12] coreutils 8.23-2 MIGRATED to testing (Britney)
  • 1
  • 2
bugs [bug history graph]
  • all: 343 356
  • RC: 1
  • I&N: 164 170
  • M&W: 178 185
  • F&P: 0
  • patch: 15 16
links
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 67)
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 8.32-4.1ubuntu1
  • 161 bugs (7 patches)
  • patches for 8.32-4.1ubuntu1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing