Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Util\-Linux
(Kernel)Repositories |
• https://github.com/karelzak/util-linux
• https://github.com/kerolasa/lelux-utiliteetit |
#Vulnerabilities | 14 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2017-08-23 | CVE-2015-5224 | The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks. | Util\-Linux | N/A | ||
2017-02-07 | CVE-2016-2779 | runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. | Util\-Linux | 7.8 | ||
2015-11-09 | CVE-2015-5218 | Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable. | Util\-Linux, Opensuse, Leap | N/A | ||
2014-01-21 | CVE-2013-0157 | (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists. | Util\-Linux | N/A |