cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2017-2616,https://securityvulnerability.io/vulnerability/CVE-2017-2616,,A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.,Linux,Util-linux,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2018-07-27T19:00:00.000Z,0 CVE-2011-1675,https://securityvulnerability.io/vulnerability/CVE-2011-1675,,"mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.",Linux,Util-linux,,,0.0004400000034365803,false,false,false,false,,false,false,2011-04-10T01:29:00.000Z,0 CVE-2011-1676,https://securityvulnerability.io/vulnerability/CVE-2011-1676,,"mount in util-linux 2.19 and earlier does not remove the /etc/mtab.tmp file after a failed attempt to add a mount entry, which allows local users to trigger corruption of the /etc/mtab file via multiple invocations.",Linux,Util-linux,,,0.0004400000034365803,false,false,false,false,,false,false,2011-04-10T01:29:00.000Z,0 CVE-2011-1677,https://securityvulnerability.io/vulnerability/CVE-2011-1677,,"mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.",Linux,Util-linux,,,0.0006399999838322401,false,false,false,false,,false,false,2011-04-10T01:29:00.000Z,0 CVE-2008-1926,https://securityvulnerability.io/vulnerability/CVE-2008-1926,,"Argument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier makes it easier for remote attackers to hide activities by modifying portions of log events, as demonstrated by appending an ""addr="" statement to the login name, aka ""audit log injection.""",Linux,Util-linux,,,0.015429999679327011,false,false,false,false,,false,false,2008-04-24T05:05:00.000Z,0