Search for packages
purl | pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2 |
Vulnerability | Summary | Fixed by |
---|---|---|
This package is not known to be affected by vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-76cx-g8f5-aaad | wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover. |
CVE-2024-28085
|
VCID-9hwf-nqgn-aaaa | An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments. |
CVE-2021-37600
|
VCID-a8gu-kbtv-aaak | A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems. |
CVE-2021-3995
|
VCID-f1h6-9jeh-aaae | A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems. |
CVE-2021-3996
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-06-21T19:11:17.557157+00:00 | Debian Oval Importer | Fixing | VCID-9hwf-nqgn-aaaa | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.1.3 |
2025-06-21T16:03:26.545928+00:00 | Debian Importer | Fixing | VCID-9hwf-nqgn-aaaa | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T02:52:27.344314+00:00 | Debian Oval Importer | Fixing | VCID-f1h6-9jeh-aaae | None | 36.1.3 |
2025-06-21T02:39:57.593818+00:00 | Debian Oval Importer | Fixing | VCID-a8gu-kbtv-aaak | None | 36.1.3 |
2025-06-21T01:38:40.393842+00:00 | Debian Oval Importer | Fixing | VCID-9hwf-nqgn-aaaa | None | 36.1.3 |
2025-06-20T23:55:54.457614+00:00 | Debian Importer | Fixing | VCID-9hwf-nqgn-aaaa | None | 36.1.3 |
2025-06-08T13:19:03.884225+00:00 | Debian Oval Importer | Fixing | VCID-f1h6-9jeh-aaae | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.1.0 |
2025-06-08T12:35:32.275548+00:00 | Debian Oval Importer | Fixing | VCID-a8gu-kbtv-aaak | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.1.0 |
2025-06-08T11:40:11.046439+00:00 | Debian Oval Importer | Fixing | VCID-9hwf-nqgn-aaaa | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.1.0 |
2025-06-07T20:19:49.599499+00:00 | Debian Oval Importer | Fixing | VCID-f1h6-9jeh-aaae | None | 36.1.0 |
2025-06-07T20:04:54.323912+00:00 | Debian Oval Importer | Fixing | VCID-a8gu-kbtv-aaak | None | 36.1.0 |
2025-06-07T19:01:45.776952+00:00 | Debian Oval Importer | Fixing | VCID-9hwf-nqgn-aaaa | None | 36.1.0 |
2025-04-12T23:13:34.985929+00:00 | Debian Oval Importer | Fixing | VCID-76cx-g8f5-aaad | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T23:11:36.788772+00:00 | Debian Oval Importer | Fixing | VCID-76cx-g8f5-aaad | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-12T23:03:29.487648+00:00 | Debian Oval Importer | Fixing | VCID-9hwf-nqgn-aaaa | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 36.0.0 |
2025-04-12T19:07:08.573240+00:00 | Debian Oval Importer | Fixing | VCID-f1h6-9jeh-aaae | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T18:22:04.241357+00:00 | Debian Oval Importer | Fixing | VCID-a8gu-kbtv-aaak | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-12T17:24:52.680422+00:00 | Debian Oval Importer | Fixing | VCID-9hwf-nqgn-aaaa | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-07T18:55:09.933898+00:00 | Debian Oval Importer | Fixing | VCID-f1h6-9jeh-aaae | None | 36.0.0 |
2025-04-07T18:42:11.686164+00:00 | Debian Oval Importer | Fixing | VCID-a8gu-kbtv-aaak | None | 36.0.0 |
2025-04-07T17:39:37.388157+00:00 | Debian Oval Importer | Fixing | VCID-9hwf-nqgn-aaaa | None | 36.0.0 |
2025-04-05T12:33:42.965577+00:00 | Debian Importer | Fixing | VCID-9hwf-nqgn-aaaa | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-04T02:37:26.025438+00:00 | Debian Importer | Fixing | VCID-9hwf-nqgn-aaaa | None | 36.0.0 |
2025-02-20T03:06:57.866024+00:00 | Debian Importer | Fixing | VCID-9hwf-nqgn-aaaa | https://security-tracker.debian.org/tracker/data/json | 35.1.0 |
2025-02-20T03:06:53.327714+00:00 | Debian Importer | Fixing | VCID-9hwf-nqgn-aaaa | None | 35.1.0 |