CVE-2011-1677

mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.
References
Link Resource
http://openwall.com/lists/oss-security/2011/03/04/10 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/04/11 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/04/12 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/04/9 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/05/3 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/05/7 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/07/9 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/14/16 Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/14/5 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/14/7 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/15/6 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/22/4 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/22/6 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/31/3 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/31/4 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/04/01/2 Mailing List Third Party Advisory
http://secunia.com/advisories/48114
http://www.redhat.com/support/errata/RHSA-2011-1691.html Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=688980 Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/66703
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*
cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-04-10 02:55

Updated : 2024-02-04 17:54


NVD link : CVE-2011-1677

Mitre link : CVE-2011-1677

CVE.ORG link : CVE-2011-1677


JSON object : View

Products Affected

linux

  • util-linux