
CVE-2024-28085 – Ubuntu Security Notice USN-6719-1
https://notcve.org/view.php?id=CVE-2024-28085
27 Mar 2024 — wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover. wall en util-linux hasta 2.40, a menudo instalado con permisos setgid tty, permite enviar secuencias de escape a terminales de otros usuarios a través de argv. (Espe... • https://packetstorm.news/files/id/177840 • CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences •

CVE-2020-21583
https://notcve.org/view.php?id=CVE-2020-21583
22 Aug 2023 — An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2022-0563 – Gentoo Linux Security Advisory 202401-08
https://notcve.org/view.php?id=CVE-2022-0563
21 Feb 2022 — A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4. • https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2021-3995 – snap-confine must_mkdir_and_open_with_perms() Race Condition
https://notcve.org/view.php?id=CVE-2021-3995
28 Jan 2022 — A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems. Se ha encontrado un error lógico en la biblioteca libmount de util-linu... • https://packetstorm.news/files/id/170176 • CWE-552: Files or Directories Accessible to External Parties •

CVE-2021-3996 – snap-confine must_mkdir_and_open_with_perms() Race Condition
https://notcve.org/view.php?id=CVE-2021-3996
28 Jan 2022 — A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems. Se ha encontrado un error lógico en la biblioteca libmount de util-linux en ... • https://packetstorm.news/files/id/170176 • CWE-552: Files or Directories Accessible to External Parties •

CVE-2021-37600 – Gentoo Linux Security Advisory 202401-08
https://notcve.org/view.php?id=CVE-2021-37600
28 Jul 2021 — An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments. ** EN DISPUTA ** Un desbordamiento de enteros en util-linux hasta la versión 2.37.1 puede potencialmente causar un desbordamiento de búfer si un atacante fuera capaz de utilizar los recursos del sistema... • https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c • CWE-190: Integer Overflow or Wraparound •

CVE-2018-7738 – Ubuntu Security Notice USN-4512-1
https://notcve.org/view.php?id=CVE-2018-7738
06 Mar 2018 — In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion. En util-linux, en versiones anteriores a la 2.32-rc1, bash-completion/umount permite que usuarios locales obtengan privilegios embebiendo comandos shell en un nombre mountpoint, que se ... • http://www.securityfocus.com/bid/103367 •

CVE-2015-5224
https://notcve.org/view.php?id=CVE-2015-5224
23 Aug 2017 — The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks. La función mkostemp en login-utils en util-linux, al usarse de forma incorrecta, permite que atacantes remotos provoquen una colisión de nombre de archivo y, posiblemente, otros ataques. • http://www.openwall.com/lists/oss-security/2015/08/24/3 •

CVE-2016-2779
https://notcve.org/view.php?id=CVE-2016-2779
07 Feb 2017 — runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. runuser en util-linux permite a usuarios locales escapar a la sesión principal a través de una llamada ioctl TIOCSTI manipulada, que empuja caracteres al búfer de entrada del terminal. • http://www.openwall.com/lists/oss-security/2016/02/27/1 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2016-5011 – util-linux: Extended partition loop in MBR partition table leads to DOS
https://notcve.org/view.php?id=CVE-2016-5011
04 Nov 2016 — The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset. La función parse_dos_extended en partitions/dos.c en la biblioteca libblkid en util-linux permite a atacantes físicamente próximos provocar una denegación de servicio (consumo de memoria) a través de una tabla de particiones MSDOS manipulada c... • http://rhn.redhat.com/errata/RHSA-2016-2605.html •