Search for packages
purl | pkg:deb/ubuntu/util-linux@2.28.1-1ubuntu1 |
Next non-vulnerable version | 2.33.1-0.1ubuntu2 |
Latest non-vulnerable version | 2.33.1-0.1ubuntu2 |
Risk | 3.9 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-48cm-kxb5-aaag
Aliases: CVE-2016-2779 |
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. |
Affected by 0 other vulnerabilities. |
VCID-n9v7-sg5s-aaac
Aliases: (+ CVE-2017-2616 fix) regression |
A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. |
Affected by 3 other vulnerabilities. |
VCID-xgvn-7emk-aaaj
Aliases: CVE-2018-7738 |
In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion. |
Affected by 0 other vulnerabilities. |
VCID-xkfe-mpjz-aaap
Aliases: CVE-2016-5011 |
The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|