23 results (0.007 seconds)

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 2

An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804 https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4. • https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments. ** EN DISPUTA ** Un desbordamiento de enteros en util-linux hasta la versión 2.37.1 puede potencialmente causar un desbordamiento de búfer si un atacante fuera capaz de utilizar los recursos del sistema de una manera que lleve a un número grande en el archivo /proc/sysvipc/sem. NOTA: esto es inexplotable en entornos de GNU C Library, y posiblemente en todos los entornos realistas • https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20210902-0002 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion. En util-linux, en versiones anteriores a la 2.32-rc1, bash-completion/umount permite que usuarios locales obtengan privilegios embebiendo comandos shell en un nombre mountpoint, que se gestiona de manera incorrecta durante un comando umount (en Bash) ejecutado por otro usuario. Esto se demuestra iniciando sesión como root y escribiendo unmount, seguido por un carácter de tabulador para autocompletar. • http://www.securityfocus.com/bid/103367 https://bugs.debian.org/892179 https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55 https://github.com/karelzak/util-linux/issues/539 https://usn.ubuntu.com/4512-1 https://www.debian.org/security/2018/dsa-4134 •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks. La función mkostemp en login-utils en util-linux, al usarse de forma incorrecta, permite que atacantes remotos provoquen una colisión de nombre de archivo y, posiblemente, otros ataques. • http://www.openwall.com/lists/oss-security/2015/08/24/3 http://www.securityfocus.com/bid/76467 https://bugzilla.redhat.com/show_bug.cgi?id=1256686 https://github.com/karelzak/util-linux/commit/bde91c85bdc77975155058276f99d2e0f5eab5a9 •