mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.
The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Util-linux | Kernel | * | 2.13.1.1 (including) |
Loop-aes-utils | Loop-aes-utils_project | - (including) | - (including) |
Red Hat Enterprise Linux 3 | RedHat | util-linux-0:2.11y-31.24 | * |
Red Hat Enterprise Linux 4 | RedHat | util-linux-0:2.12a-17.el4_6.1 | * |
Red Hat Enterprise Linux 5 | RedHat | util-linux-0:2.13-0.45.el5_1.1 | * |
Loop-aes-utils | Ubuntu | dapper | * |
Loop-aes-utils | Ubuntu | devel | * |
Loop-aes-utils | Ubuntu | edgy | * |
Loop-aes-utils | Ubuntu | feisty | * |
Loop-aes-utils | Ubuntu | gutsy | * |
Loop-aes-utils | Ubuntu | hardy | * |
Loop-aes-utils | Ubuntu | intrepid | * |
Loop-aes-utils | Ubuntu | jaunty | * |
Loop-aes-utils | Ubuntu | karmic | * |
Util-linux | Ubuntu | dapper | * |
Util-linux | Ubuntu | devel | * |
Util-linux | Ubuntu | edgy | * |
Util-linux | Ubuntu | feisty | * |
Util-linux | Ubuntu | gutsy | * |
Util-linux | Ubuntu | hardy | * |
Util-linux | Ubuntu | intrepid | * |
Util-linux | Ubuntu | jaunty | * |
Util-linux | Ubuntu | karmic | * |
Util-linux | Ubuntu | upstream | * |