CVE-2016-5011
- EPSS 0.14%
- Veröffentlicht 11.04.2017 15:59:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot reco...
CVE-2014-9114
- EPSS 0.13%
- Veröffentlicht 31.03.2017 16:59:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
CVE-2016-2779
- EPSS 0.04%
- Veröffentlicht 07.02.2017 15:59:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
CVE-2015-5218
- EPSS 0.08%
- Veröffentlicht 09.11.2015 16:59:06
- Zuletzt bearbeitet 06.05.2026 22:30:45
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
CVE-2013-0157
- EPSS 0.06%
- Veröffentlicht 21.01.2014 18:55:09
- Zuletzt bearbeitet 29.04.2026 01:13:23
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent de...
CVE-2007-5191
- EPSS 0.1%
- Veröffentlicht 04.10.2007 16:17:00
- Zuletzt bearbeitet 23.04.2026 00:35:47
mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.
CVE-2001-1494
- EPSS 0.08%
- Veröffentlicht 31.12.2001 05:00:00
- Zuletzt bearbeitet 16.04.2026 00:27:16
script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.