Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

11 – 20 of 22 results


CVE-2017-2616

Medium priority

Some fixes available 8 of 13

A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.

2 affected packages

shadow, util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
shadow Fixed Fixed
util-linux Not affected Not affected
Show less packages

CVE-2016-2779

Low priority
Ignored

runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

1 affected packages

util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
util-linux Not affected Not affected Not affected Ignored
Show less packages

CVE-2015-5218

Low priority
Ignored

Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.

2 affected packages

bsdmainutils, util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
bsdmainutils Not affected Not affected Not affected Not affected
util-linux Not affected Not affected Not affected Not affected
Show less packages

CVE-2013-0157

Low priority
Vulnerable

(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to...

1 affected packages

util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
util-linux Not affected Not affected Not affected Not affected Not affected
Show less packages

CVE-2011-1677

Low priority
Ignored

mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.

1 affected packages

util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
util-linux
Show less packages

CVE-2011-1676

Low priority
Ignored

mount in util-linux 2.19 and earlier does not remove the /etc/mtab.tmp file after a failed attempt to add a mount entry, which allows local users to trigger corruption of the /etc/mtab file via multiple invocations.

1 affected packages

util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
util-linux
Show less packages

CVE-2011-1675

Low priority
Ignored

mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process...

1 affected packages

util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
util-linux
Show less packages

CVE-2010-3879

Medium priority

Some fixes available 8 of 10

FUSE, possibly 2.8.5 and earlier, allows local users to create mtab entries with arbitrary pathnames, and consequently unmount any filesystem, via a symlink attack on the parent directory of the mountpoint of a FUSE filesystem, a...

2 affected packages

fuse, util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
fuse
util-linux
Show less packages

CVE-2008-1926

Medium priority
Ignored

Argument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier makes it easier for remote attackers to hide activities by modifying portions of log events, as demonstrated by appending an "addr="...

1 affected packages

util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
util-linux
Show less packages

CVE-2007-5191

Medium priority

Some fixes available 12 of 16

mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.

2 affected packages

loop-aes-utils, util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
loop-aes-utils
util-linux
Show less packages