Vulnerabilities > Kernel > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-11-27 | CVE-2018-17953 | Unspecified vulnerability in Kernel Linux-Pam 1.3.0 A incorrect variable in a SUSE specific patch for pam_access rule matching in PAM 1.3.0 in openSUSE Leap 15.0 and SUSE Linux Enterprise 15 could lead to pam_access rules not being applied (fail open). | 8.1 |
2018-03-07 | CVE-2018-7738 | Unspecified vulnerability in Kernel Util-Linux In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion. | 7.2 |
2017-08-23 | CVE-2015-5224 | Unspecified vulnerability in Kernel Util-Linux The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks. | 7.5 |
2017-03-31 | CVE-2014-9114 | Command Injection vulnerability in multiple products Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code. | 7.8 |
2017-02-07 | CVE-2016-2779 | Permissions, Privileges, and Access Controls vulnerability in Kernel Util-Linux 2.24.21 runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. | 7.2 |