Kernel util-linux 2.27

CPE Details

Kernel util-linux 2.27
2.27
2019-01-04
13h12 +00:00
2020-09-10
16h08 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:kernel:util-linux:2.27:*:*:*:*:*:*:*

Informations

Vendor

kernel

Product

util-linux

Version

2.27

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-28085 2024-03-26 23h00 +00:00 wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
3.3
Low
CVE-2022-0563 2022-02-20 23h00 +00:00 A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
5.5
Medium
CVE-2021-37600 2021-07-27 22h00 +00:00 An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
5.5
Medium
CVE-2018-7738 2018-03-06 21h00 +00:00 In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.
7.8
High
CVE-2016-5011 2017-04-11 13h00 +00:00 The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
4.6
Medium