Kernel util-linux 2.36.2

CPE Details

Kernel util-linux 2.36.2
2.36.2
2021-06-28
16h38 +00:00
2021-06-28
16h39 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:kernel:util-linux:2.36.2:*:*:*:*:*:*:*

Informations

Vendor

kernel

Product

util-linux

Version

2.36.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-28085 2024-03-26 23h00 +00:00 wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
3.3
Low
CVE-2021-3995 2022-08-22 22h00 +00:00 A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.
5.5
Medium
CVE-2021-3996 2022-08-22 22h00 +00:00 A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.
5.5
Medium
CVE-2022-0563 2022-02-20 23h00 +00:00 A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
5.5
Medium
CVE-2021-37600 2021-07-27 22h00 +00:00 An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
5.5
Medium