Show filters
25 Total Results
Displaying 11-20 of 25
Sort by:
Attacker Value
Unknown
CVE-2018-7738
Disclosure Date: March 07, 2018 (last updated November 26, 2024)
In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.
0
Attacker Value
Unknown
CVE-2015-5224
Disclosure Date: August 23, 2017 (last updated November 26, 2024)
The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks.
0
Attacker Value
Unknown
CVE-2016-5011
Disclosure Date: April 11, 2017 (last updated November 26, 2024)
The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
0
Attacker Value
Unknown
CVE-2014-9114
Disclosure Date: March 31, 2017 (last updated November 08, 2023)
Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2016-2779
Disclosure Date: February 07, 2017 (last updated November 26, 2024)
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
0
Attacker Value
Unknown
CVE-2015-5218
Disclosure Date: November 09, 2015 (last updated October 05, 2023)
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
0
Attacker Value
Unknown
CVE-2014-0974
Disclosure Date: August 25, 2014 (last updated October 05, 2023)
The boot_linux_from_mmc function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly validate a certain address value, which allows attackers to write data to a controllable memory location by leveraging the ability to initiate an attempted boot of an arbitrary image.
0
Attacker Value
Unknown
CVE-2014-4325
Disclosure Date: August 25, 2014 (last updated October 05, 2023)
The cmd_boot function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to bypass intended device-lock and kernel-signature restrictions by using fastboot mode in a boot command for an arbitrary kernel image.
0
Attacker Value
Unknown
CVE-2014-0973
Disclosure Date: August 25, 2014 (last updated October 05, 2023)
The image_verify function in platform/msm_shared/image_verify.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not check whether a certain digest size is consistent with the RSA_public_decrypt API specification, which makes it easier for attackers to bypass boot-image authentication requirements via trailing data.
0
Attacker Value
Unknown
CVE-2013-0157
Disclosure Date: January 21, 2014 (last updated October 05, 2023)
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.
0