Lucene search

K
LinuxUtil-linux

5 matches found

CVE
CVE
added 2018/07/27 7:29 p.m.172 views

CVE-2017-2616

A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.

5.5CVSS4.9AI score0.00061EPSS
CVE
CVE
added 2011/04/10 2:55 a.m.81 views

CVE-2011-1675

mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.

3.3CVSS7.7AI score0.00087EPSS
CVE
CVE
added 2011/04/10 2:55 a.m.65 views

CVE-2011-1677

mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.

4.6CVSS7.1AI score0.00043EPSS
CVE
CVE
added 2008/04/24 5:5 a.m.60 views

CVE-2008-1926

Argument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier makes it easier for remote attackers to hide activities by modifying portions of log events, as demonstrated by appending an "addr=" statement to the login name, aka "audit log injection."

7.5CVSS6.6AI score0.01774EPSS
CVE
CVE
added 2011/04/10 2:55 a.m.48 views

CVE-2011-1676

mount in util-linux 2.19 and earlier does not remove the /etc/mtab.tmp file after a failed attempt to add a mount entry, which allows local users to trigger corruption of the /etc/mtab file via multiple invocations.

3.3CVSS6.4AI score0.00098EPSS