CVE-2009-4135
11.12.2009, 16:30
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
Vendor | Product | Version |
---|---|---|
canonical | ubuntu_linux | 10.04 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
gnu | coreutils | 5.2.1 |
gnu | coreutils | 5.91 |
gnu | coreutils | 5.92 |
gnu | coreutils | 5.93 |
gnu | coreutils | 5.94 |
gnu | coreutils | 5.95 |
gnu | coreutils | 5.96 |
gnu | coreutils | 5.97 |
gnu | coreutils | 6.2 |
gnu | coreutils | 6.3 |
gnu | coreutils | 6.4 |
gnu | coreutils | 6.5 |
gnu | coreutils | 6.6 |
gnu | coreutils | 6.7 |
gnu | coreutils | 6.8 |
gnu | coreutils | 6.9 |
gnu | coreutils | 6.10 |
gnu | coreutils | 6.11 |
gnu | coreutils | 6.12 |
gnu | coreutils | 7.1 |
gnu | coreutils | 7.2 |
gnu | coreutils | 7.3 |
gnu | coreutils | 7.4 |
gnu | coreutils | 7.5 |
gnu | coreutils | 7.6 |
gnu | coreutils | 8.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References