CVE Vulnerabilities

CVE-2007-5191

Unchecked Return Value

Published: Oct 04, 2007 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.

Weakness

The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.

Affected Software

NameVendorStart VersionEnd Version
Util-linuxKernel*2.13.1.1 (including)
Loop-aes-utilsLoop-aes-utils_project- (including)- (including)
Red Hat Enterprise Linux 3RedHatutil-linux-0:2.11y-31.24*
Red Hat Enterprise Linux 4RedHatutil-linux-0:2.12a-17.el4_6.1*
Red Hat Enterprise Linux 5RedHatutil-linux-0:2.13-0.45.el5_1.1*
Loop-aes-utilsUbuntudapper*
Loop-aes-utilsUbuntudevel*
Loop-aes-utilsUbuntuedgy*
Loop-aes-utilsUbuntufeisty*
Loop-aes-utilsUbuntugutsy*
Loop-aes-utilsUbuntuhardy*
Loop-aes-utilsUbuntuintrepid*
Loop-aes-utilsUbuntujaunty*
Loop-aes-utilsUbuntukarmic*
Util-linuxUbuntudapper*
Util-linuxUbuntudevel*
Util-linuxUbuntuedgy*
Util-linuxUbuntufeisty*
Util-linuxUbuntugutsy*
Util-linuxUbuntuhardy*
Util-linuxUbuntuintrepid*
Util-linuxUbuntujaunty*
Util-linuxUbuntukarmic*
Util-linuxUbuntuupstream*

Potential Mitigations

References