← Zuruck zu CVEs
CVE-2005-2876
N/ABeschreibung
umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht9/13/2005
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
andries_brouwer:util-linux
Referenzen
http://marc.info/?l=bugtraq&m=112656096125857&w=2(secalert@redhat.com)
http://marc.info/?l=bugtraq&m=112690609622266&w=2(secalert@redhat.com)
http://secunia.com/advisories/16785(secalert@redhat.com)
http://secunia.com/advisories/16988(secalert@redhat.com)
http://secunia.com/advisories/17004(secalert@redhat.com)
http://secunia.com/advisories/17027(secalert@redhat.com)
http://secunia.com/advisories/17133(secalert@redhat.com)
http://secunia.com/advisories/17154(secalert@redhat.com)
http://secunia.com/advisories/18502(secalert@redhat.com)
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101960-1(secalert@redhat.com)
http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm(secalert@redhat.com)
http://www.debian.org/security/2005/dsa-823(secalert@redhat.com)
http://www.debian.org/security/2005/dsa-825(secalert@redhat.com)
http://www.novell.com/linux/security/advisories/2005_21_sr.html(secalert@redhat.com)
http://www.osvdb.org/19369(secalert@redhat.com)
http://www.securityfocus.com/archive/1/419774/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/bid/14816(secalert@redhat.com)
http://www.ubuntu.com/usn/usn-184-1(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22241(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10921(secalert@redhat.com)
http://marc.info/?l=bugtraq&m=112656096125857&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=112690609622266&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/16785(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/16988(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17004(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17027(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17133(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17154(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18502(af854a3a-2127-422b-91ae-364da2661108)
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101960-1(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-823(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-825(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2005_21_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/19369(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/419774/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/14816(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-184-1(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22241(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10921(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.