First published: Tue Apr 12 2011(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2011-1676">CVE-2011-1676</a> to the following vulnerability: Name: <a href="https://access.redhat.com/security/cve/CVE-2011-1676">CVE-2011-1676</a> URL: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1676">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1676</a> Assigned: 20110409 Reference: <a href="http://openwall.com/lists/oss-security/2011/03/04/11">http://openwall.com/lists/oss-security/2011/03/04/11</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/04/9">http://openwall.com/lists/oss-security/2011/03/04/9</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/04/10">http://openwall.com/lists/oss-security/2011/03/04/10</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/04/12">http://openwall.com/lists/oss-security/2011/03/04/12</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/05/3">http://openwall.com/lists/oss-security/2011/03/05/3</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/05/7">http://openwall.com/lists/oss-security/2011/03/05/7</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/07/9">http://openwall.com/lists/oss-security/2011/03/07/9</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/14/5">http://openwall.com/lists/oss-security/2011/03/14/5</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/14/7">http://openwall.com/lists/oss-security/2011/03/14/7</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/14/16">http://openwall.com/lists/oss-security/2011/03/14/16</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/15/6">http://openwall.com/lists/oss-security/2011/03/15/6</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/22/4">http://openwall.com/lists/oss-security/2011/03/22/4</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/22/6">http://openwall.com/lists/oss-security/2011/03/22/6</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/31/3">http://openwall.com/lists/oss-security/2011/03/31/3</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/03/31/4">http://openwall.com/lists/oss-security/2011/03/31/4</a> Reference: <a href="http://openwall.com/lists/oss-security/2011/04/01/2">http://openwall.com/lists/oss-security/2011/04/01/2</a> Reference: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2011-1089 glibc: Suid mount helpers fail to anticipate RLIMIT_FSIZE" href="show_bug.cgi?id=688980">https://bugzilla.redhat.com/show_bug.cgi?id=688980</a> mount in util-linux 2.19 and earlier does not remove the /etc/mtab.tmp file after a failed attempt to add a mount entry, which allows local users to trigger corruption of the /etc/mtab file via multiple invocations.
Affected Software | Affected Version | How to fix |
---|---|---|
Util-linux | <2.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-695921 is associated with CVE-2011-1676, which has a medium severity rating.
To fix REDHAT-BUG-695921, upgrade to a version of util-linux higher than 2.19.
REDHAT-BUG-695921 affects the Red Hat util-linux package version 2.19 and below.
REDHAT-BUG-695921 is a vulnerability in the util-linux package that can potentially lead to privilege escalation.
There are no specific workarounds for REDHAT-BUG-695921, and it is recommended to apply the latest updates.