Kernel

Util-linux

15 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Published 07.02.2017 15:59:00
  • Last modified 20.04.2025 01:37:25

runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

Exploit
  • EPSS 0.08%
  • Published 09.11.2015 16:59:06
  • Last modified 12.04.2025 10:46:40

Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.

  • EPSS 0.06%
  • Published 21.01.2014 18:55:09
  • Last modified 11.04.2025 00:51:21

(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent de...

  • EPSS 0.1%
  • Published 04.10.2007 16:17:00
  • Last modified 09.04.2025 00:30:58

mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.

  • EPSS 0.04%
  • Published 31.12.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.