Show filters
27 Total Results
Displaying 11-20 of 27
Sort by:
Attacker Value
Unknown
CVE-2016-2779
Disclosure Date: February 07, 2017 (last updated November 26, 2024)
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
0
Attacker Value
Unknown
CVE-2015-5218
Disclosure Date: November 09, 2015 (last updated October 05, 2023)
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
0
Attacker Value
Unknown
CVE-2013-0157
Disclosure Date: January 21, 2014 (last updated October 05, 2023)
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.
0
Attacker Value
Unknown
CVE-2011-1676
Disclosure Date: April 10, 2011 (last updated October 04, 2023)
mount in util-linux 2.19 and earlier does not remove the /etc/mtab.tmp file after a failed attempt to add a mount entry, which allows local users to trigger corruption of the /etc/mtab file via multiple invocations.
0
Attacker Value
Unknown
CVE-2011-1675
Disclosure Date: April 10, 2011 (last updated October 04, 2023)
mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
0
Attacker Value
Unknown
CVE-2011-1677
Disclosure Date: April 10, 2011 (last updated October 04, 2023)
mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.
0
Attacker Value
Unknown
CVE-2009-1956
Disclosure Date: June 08, 2009 (last updated October 04, 2023)
Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
0
Attacker Value
Unknown
CVE-2009-1955
Disclosure Date: June 08, 2009 (last updated February 03, 2024)
The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
0
Attacker Value
Unknown
CVE-2008-1926
Disclosure Date: April 24, 2008 (last updated October 04, 2023)
Argument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier makes it easier for remote attackers to hide activities by modifying portions of log events, as demonstrated by appending an "addr=" statement to the login name, aka "audit log injection."
0
Attacker Value
Unknown
CVE-2007-5191
Disclosure Date: October 04, 2007 (last updated October 04, 2023)
mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.
0