Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How great would it be if coreutils could get replaced with this implementation? We've seen vulnerabilities come from here before.


What is the primary danger of bugs in coreutils? Are there any setuid programs in there that could be used to elevate? Or is it the ability to exploit shell scripts using them? Or files that when you manually process them with coreutils install a trojan?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: