Linux Util-Linux vulnerabilities
5 known vulnerabilities affecting linux/util-linux.
Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM2LOW2
Vulnerabilities
Page 1 of 1
CVE-2017-2616MEDIUMCVSS 4.7v2.32.12018-07-27
CVE-2017-2616 [MEDIUM] CWE-267 CVE-2017-2616: A race condition was found in util-linux before 2.32.1 in the way su handled the management of child
A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
cvelistv5nvd
CVE-2011-1677MEDIUMCVSS 4.6≤ 2.19v2.2+13 more2011-04-10
CVE-2011-1677 [MEDIUM] CVE-2011-1677: mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt
mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.
nvd
CVE-2011-1676LOWCVSS 3.3≤ 2.19v2.2+13 more2011-04-10
CVE-2011-1676 [LOW] CWE-264 CVE-2011-1676: mount in util-linux 2.19 and earlier does not remove the /etc/mtab.tmp file after a failed attempt t
mount in util-linux 2.19 and earlier does not remove the /etc/mtab.tmp file after a failed attempt to add a mount entry, which allows local users to trigger corruption of the /etc/mtab file via multiple invocations.
nvd
CVE-2011-1675LOWCVSS 3.3≤ 2.19v2.2+13 more2011-04-10
CVE-2011-1675 [LOW] CVE-2011-1675: mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first chec
mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
nvd
CVE-2008-1926HIGHCVSS 7.5v2.13v2.13.0.1+3 more2008-04-24
CVE-2008-1926 [HIGH] CWE-94 CVE-2008-1926: Argument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier ma
Argument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier makes it easier for remote attackers to hide activities by modifying portions of log events, as demonstrated by appending an "addr=" statement to the login name, aka "audit log injection."
nvd