Search CVE reports
11 – 20 of 22 results
CVE-2017-2616
Medium prioritySome fixes available 8 of 13
A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
2 affected packages
shadow, util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
shadow | — | — | — | Fixed | Fixed |
util-linux | — | — | — | Not affected | Not affected |
CVE-2016-2779
Low priorityrunuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
1 affected packages
util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
util-linux | — | Not affected | Not affected | Not affected | Ignored |
CVE-2015-5218
Low priorityBuffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
2 affected packages
bsdmainutils, util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
bsdmainutils | — | Not affected | Not affected | Not affected | Not affected |
util-linux | — | Not affected | Not affected | Not affected | Not affected |
CVE-2013-0157
Low priority(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to...
1 affected packages
util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
util-linux | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2011-1677
Low prioritymount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.
1 affected packages
util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
util-linux | — | — | — | — | — |
CVE-2011-1676
Low prioritymount in util-linux 2.19 and earlier does not remove the /etc/mtab.tmp file after a failed attempt to add a mount entry, which allows local users to trigger corruption of the /etc/mtab file via multiple invocations.
1 affected packages
util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
util-linux | — | — | — | — | — |
CVE-2011-1675
Low prioritymount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process...
1 affected packages
util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
util-linux | — | — | — | — | — |
CVE-2010-3879
Medium prioritySome fixes available 8 of 10
FUSE, possibly 2.8.5 and earlier, allows local users to create mtab entries with arbitrary pathnames, and consequently unmount any filesystem, via a symlink attack on the parent directory of the mountpoint of a FUSE filesystem, a...
2 affected packages
fuse, util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
fuse | — | — | — | — | — |
util-linux | — | — | — | — | — |
CVE-2008-1926
Medium priorityArgument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier makes it easier for remote attackers to hide activities by modifying portions of log events, as demonstrated by appending an "addr="...
1 affected packages
util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
util-linux | — | — | — | — | — |
CVE-2007-5191
Medium prioritySome fixes available 12 of 16
mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.
2 affected packages
loop-aes-utils, util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
loop-aes-utils | — | — | — | — | — |
util-linux | — | — | — | — | — |