CVE-2016-2779
- EPSS 0.16%
- Published 07.02.2017 15:59:00
- Last modified 20.04.2025 01:37:25
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
CVE-2015-5218
- EPSS 0.08%
- Published 09.11.2015 16:59:06
- Last modified 12.04.2025 10:46:40
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
CVE-2013-0157
- EPSS 0.06%
- Published 21.01.2014 18:55:09
- Last modified 11.04.2025 00:51:21
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent de...
CVE-2007-5191
- EPSS 0.1%
- Published 04.10.2007 16:17:00
- Last modified 09.04.2025 00:30:58
mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.
CVE-2001-1494
- EPSS 0.04%
- Published 31.12.2001 05:00:00
- Last modified 03.04.2025 01:03:51
script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.