Skip to content

Commit c4ee3d9

Browse files
mbaumanjlsec-bot
authored andcommitted
[create-pull-request] automated change
1 parent 9172bd6 commit c4ee3d9

21 files changed

+534
-0
lines changed
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns8z6ulc-k6ao"
4+
modified = 2025-10-21T17:21:19.200Z
5+
upstream = ["CVE-2001-1147"]
6+
references = ["http://www.ciac.org/ciac/bulletins/m-009.shtml", "http://www.iss.net/security_center/static/7266.php", "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-084.php3", "http://www.novell.com/linux/security/advisories/2001_034_shadow_txt.html", "http://www.redhat.com/support/errata/RHSA-2001-132.html", "http://www.securityfocus.com/archive/1/219175", "http://www.securityfocus.com/bid/3415", "http://www.ciac.org/ciac/bulletins/m-009.shtml", "http://www.iss.net/security_center/static/7266.php", "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-084.php3", "http://www.novell.com/linux/security/advisories/2001_034_shadow_txt.html", "http://www.redhat.com/support/errata/RHSA-2001-132.html", "http://www.securityfocus.com/archive/1/219175", "http://www.securityfocus.com/bid/3415"]
7+
8+
[[affected]]
9+
pkg = "util_linux_jll"
10+
ranges = ["< 2.39.3+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2001-1147"
14+
imported = 2025-10-21T17:21:19.171Z
15+
modified = 2025-04-03T01:03:51.193Z
16+
published = 2001-10-08T04:00:00.000Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2001-1147"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2001-1147"
19+
```
20+
21+
# The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry t...
22+
23+
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns8z6ulf-1ml5sl3"
4+
modified = 2025-10-21T17:21:19.203Z
5+
upstream = ["CVE-2001-1175"]
6+
references = ["http://www.redhat.com/support/errata/RHSA-2001-095.html", "http://www.redhat.com/support/errata/RHSA-2001-132.html", "http://www.securityfocus.com/bid/3036", "https://exchange.xforce.ibmcloud.com/vulnerabilities/6851", "http://www.redhat.com/support/errata/RHSA-2001-095.html", "http://www.redhat.com/support/errata/RHSA-2001-132.html", "http://www.securityfocus.com/bid/3036", "https://exchange.xforce.ibmcloud.com/vulnerabilities/6851"]
7+
8+
[[affected]]
9+
pkg = "util_linux_jll"
10+
ranges = ["< 2.39.3+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2001-1175"
14+
imported = 2025-10-21T17:21:19.203Z
15+
modified = 2025-04-03T01:03:51.193Z
16+
published = 2002-04-01T05:00:00.000Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2001-1175"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2001-1175"
19+
```
20+
21+
# vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, wh...
22+
23+
vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns8z6uli-13eyna2"
4+
modified = 2025-10-21T17:21:19.206Z
5+
upstream = ["CVE-2003-0094"]
6+
references = ["http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:016", "http://www.securityfocus.com/bid/6855", "https://exchange.xforce.ibmcloud.com/vulnerabilities/11318", "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:016", "http://www.securityfocus.com/bid/6855", "https://exchange.xforce.ibmcloud.com/vulnerabilities/11318"]
7+
8+
[[affected]]
9+
pkg = "util_linux_jll"
10+
ranges = ["< 2.39.3+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2003-0094"
14+
imported = 2025-10-21T17:21:19.206Z
15+
modified = 2025-04-03T01:03:51.193Z
16+
published = 2003-03-03T05:00:00.000Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2003-0094"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2003-0094"
19+
```
20+
21+
# A patch for mcookie in the util-linux package for Mandrake Linux 8.2 and 9.0 uses /dev/urandom inste...
22+
23+
A patch for mcookie in the util-linux package for Mandrake Linux 8.2 and 9.0 uses /dev/urandom instead of /dev/random, which causes mcookie to use an entropy source that is more predictable than expected, which may make it easier for certain types of attacks to succeed.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns8z6um0-4243jv"
4+
modified = 2025-10-21T17:21:19.224Z
5+
upstream = ["CVE-2004-0080"]
6+
references = ["ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc", "ftp://patches.sgi.com/support/free/security/advisories/20040406-01-U", "http://marc.info/?l=bugtraq&m=108077689801698&w=2", "http://marc.info/?l=bugtraq&m=108144719532385&w=2", "http://secunia.com/advisories/10773", "http://security.gentoo.org/glsa/glsa-200404-06.xml", "http://www.kb.cert.org/vuls/id/801526", "http://www.osvdb.org/3796", "http://www.redhat.com/support/errata/RHSA-2004-056.html", "http://www.securityfocus.com/bid/9558", "https://exchange.xforce.ibmcloud.com/vulnerabilities/15016", "ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc", "ftp://patches.sgi.com/support/free/security/advisories/20040406-01-U", "http://marc.info/?l=bugtraq&m=108077689801698&w=2", "http://marc.info/?l=bugtraq&m=108144719532385&w=2", "http://secunia.com/advisories/10773", "http://security.gentoo.org/glsa/glsa-200404-06.xml", "http://www.kb.cert.org/vuls/id/801526", "http://www.osvdb.org/3796", "http://www.redhat.com/support/errata/RHSA-2004-056.html", "http://www.securityfocus.com/bid/9558", "https://exchange.xforce.ibmcloud.com/vulnerabilities/15016"]
7+
8+
[[affected]]
9+
pkg = "util_linux_jll"
10+
ranges = ["< 2.39.3+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2004-0080"
14+
imported = 2025-10-21T17:21:19.224Z
15+
modified = 2025-04-03T01:03:51.193Z
16+
published = 2004-03-03T05:00:00.000Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2004-0080"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2004-0080"
19+
```
20+
21+
# The login program in util-linux 2.11 and earlier uses a pointer after it has been freed and realloca...
22+
23+
The login program in util-linux 2.11 and earlier uses a pointer after it has been freed and reallocated, which could cause login to leak sensitive data.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns8z6umi-183iz8l"
4+
modified = 2025-10-21T17:21:19.242Z
5+
upstream = ["CVE-2005-2876"]
6+
references = ["http://marc.info/?l=bugtraq&m=112656096125857&w=2", "http://marc.info/?l=bugtraq&m=112690609622266&w=2", "http://secunia.com/advisories/16785", "http://secunia.com/advisories/16988", "http://secunia.com/advisories/17004", "http://secunia.com/advisories/17027", "http://secunia.com/advisories/17133", "http://secunia.com/advisories/17154", "http://secunia.com/advisories/18502", "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101960-1", "http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm", "http://www.debian.org/security/2005/dsa-823", "http://www.debian.org/security/2005/dsa-825", "http://www.novell.com/linux/security/advisories/2005_21_sr.html", "http://www.osvdb.org/19369", "http://www.securityfocus.com/archive/1/419774/100/0/threaded", "http://www.securityfocus.com/bid/14816", "http://www.ubuntu.com/usn/usn-184-1", "https://exchange.xforce.ibmcloud.com/vulnerabilities/22241", "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10921", "http://marc.info/?l=bugtraq&m=112656096125857&w=2", "http://marc.info/?l=bugtraq&m=112690609622266&w=2", "http://secunia.com/advisories/16785", "http://secunia.com/advisories/16988", "http://secunia.com/advisories/17004", "http://secunia.com/advisories/17027", "http://secunia.com/advisories/17133", "http://secunia.com/advisories/17154", "http://secunia.com/advisories/18502", "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101960-1", "http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm", "http://www.debian.org/security/2005/dsa-823", "http://www.debian.org/security/2005/dsa-825", "http://www.novell.com/linux/security/advisories/2005_21_sr.html", "http://www.osvdb.org/19369", "http://www.securityfocus.com/archive/1/419774/100/0/threaded", "http://www.securityfocus.com/bid/14816", "http://www.ubuntu.com/usn/usn-184-1", "https://exchange.xforce.ibmcloud.com/vulnerabilities/22241", "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10921"]
7+
8+
[[affected]]
9+
pkg = "util_linux_jll"
10+
ranges = ["< 2.39.3+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2005-2876"
14+
imported = 2025-10-21T17:21:19.242Z
15+
modified = 2025-04-03T01:03:51.193Z
16+
published = 2005-09-13T23:03:00.000Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2005-2876"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2005-2876"
19+
```
20+
21+
# umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-uti...
22+
23+
umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns8z6umj-1hzyj5q"
4+
modified = 2025-10-21T17:21:19.243Z
5+
upstream = ["CVE-2006-7108"]
6+
references = ["http://secunia.com/advisories/25098", "http://secunia.com/advisories/25530", "http://secunia.com/advisories/25692", "http://secunia.com/advisories/25935", "http://support.avaya.com/elmodocs2/security/ASA-2007-252.htm", "http://www.mandriva.com/security/advisories?name=MDKSA-2007:111", "http://www.redhat.com/support/errata/RHSA-2007-0235.html", "http://www.securityfocus.com/bid/24321", "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177331", "https://issues.rpath.com/browse/RPL-1359", "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9689", "http://secunia.com/advisories/25098", "http://secunia.com/advisories/25530", "http://secunia.com/advisories/25692", "http://secunia.com/advisories/25935", "http://support.avaya.com/elmodocs2/security/ASA-2007-252.htm", "http://www.mandriva.com/security/advisories?name=MDKSA-2007:111", "http://www.redhat.com/support/errata/RHSA-2007-0235.html", "http://www.securityfocus.com/bid/24321", "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177331", "https://issues.rpath.com/browse/RPL-1359", "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9689"]
7+
8+
[[affected]]
9+
pkg = "util_linux_jll"
10+
ranges = ["< 2.39.3+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2006-7108"
14+
imported = 2025-10-21T17:21:19.243Z
15+
modified = 2025-04-09T00:30:58.490Z
16+
published = 2007-03-04T22:19:00.000Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2006-7108"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2006-7108"
19+
```
20+
21+
# login in util-linux-2.12a skips pam_acct_mgmt and chauth_tok when authentication is skipped, such as...
22+
23+
login in util-linux-2.12a skips pam_acct_mgmt and chauth_tok when authentication is skipped, such as when a Kerberos krlogin session has been established, which might allow users to bypass intended access policies that would be enforced by pam_acct_mgmt and chauth_tok.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns8z6umk-nec7h3"
4+
modified = 2025-10-21T17:21:19.244Z
5+
upstream = ["CVE-2001-1494"]
6+
references = ["http://seclists.org/bugtraq/2001/Dec/0122.html", "http://seclists.org/bugtraq/2001/Dec/0123.html", "http://secunia.com/advisories/16785", "http://secunia.com/advisories/18502", "http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm", "http://www.redhat.com/support/errata/RHSA-2005-782.html", "http://www.securityfocus.com/bid/16280", "https://exchange.xforce.ibmcloud.com/vulnerabilities/7718", "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10723", "http://seclists.org/bugtraq/2001/Dec/0122.html", "http://seclists.org/bugtraq/2001/Dec/0123.html", "http://secunia.com/advisories/16785", "http://secunia.com/advisories/18502", "http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm", "http://www.redhat.com/support/errata/RHSA-2005-782.html", "http://www.securityfocus.com/bid/16280", "https://exchange.xforce.ibmcloud.com/vulnerabilities/7718", "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10723"]
7+
8+
[[affected]]
9+
pkg = "util_linux_jll"
10+
ranges = ["< 2.39.3+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2001-1494"
14+
imported = 2025-10-21T17:21:19.244Z
15+
modified = 2025-04-03T01:03:51.193Z
16+
published = 2001-12-31T05:00:00.000Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2001-1494"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2001-1494"
19+
```
20+
21+
# script command in the util-linux package before 2.11n allows local users to overwrite arbitrary file...
22+
23+
script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns8z6uml-q6df8j"
4+
modified = 2025-10-21T17:21:19.245Z
5+
upstream = ["CVE-2007-5191"]
6+
references = ["http://bugs.gentoo.org/show_bug.cgi?id=195390", "http://frontal2.mandriva.com/en/security/advisories?name=MDKSA-2007:198", "http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git%3Ba=commit%3Bh=ebbeb2c7ac1b00b6083905957837a271e80b187e", "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html", "http://lists.vmware.com/pipermail/security-announce/2008/000002.html", "http://secunia.com/advisories/27104", "http://secunia.com/advisories/27122", "http://secunia.com/advisories/27145", "http://secunia.com/advisories/27188", "http://secunia.com/advisories/27283", "http://secunia.com/advisories/27354", "http://secunia.com/advisories/27399", "http://secunia.com/advisories/27687", "http://secunia.com/advisories/28348", "http://secunia.com/advisories/28349", "http://secunia.com/advisories/28368", "http://secunia.com/advisories/28469", "http://security.gentoo.org/glsa/glsa-200710-18.xml", "http://support.avaya.com/elmodocs2/security/ASA-2008-023.htm", "http://www.debian.org/security/2008/dsa-1449", "http://www.debian.org/security/2008/dsa-1450", "http://www.redhat.com/support/errata/RHSA-2007-0969.html", "http://www.securityfocus.com/archive/1/485936/100/0/threaded", "http://www.securityfocus.com/archive/1/486859/100/0/threaded", "http://www.securityfocus.com/bid/25973", "http://www.securitytracker.com/id?1018782", "http://www.ubuntu.com/usn/usn-533-1", "http://www.vmware.com/security/advisories/VMSA-2008-0001.html", "http://www.vupen.com/english/advisories/2007/3417", "http://www.vupen.com/english/advisories/2008/0064", "https://bugzilla.redhat.com/show_bug.cgi?id=320041", "https://issues.rpath.com/browse/RPL-1757", "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10101", "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00144.html", "http://bugs.gentoo.org/show_bug.cgi?id=195390", "http://frontal2.mandriva.com/en/security/advisories?name=MDKSA-2007:198", "http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git%3Ba=commit%3Bh=ebbeb2c7ac1b00b6083905957837a271e80b187e", "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html", "http://lists.vmware.com/pipermail/security-announce/2008/000002.html", "http://secunia.com/advisories/27104", "http://secunia.com/advisories/27122", "http://secunia.com/advisories/27145", "http://secunia.com/advisories/27188", "http://secunia.com/advisories/27283", "http://secunia.com/advisories/27354", "http://secunia.com/advisories/27399", "http://secunia.com/advisories/27687", "http://secunia.com/advisories/28348", "http://secunia.com/advisories/28349", "http://secunia.com/advisories/28368", "http://secunia.com/advisories/28469", "http://security.gentoo.org/glsa/glsa-200710-18.xml", "http://support.avaya.com/elmodocs2/security/ASA-2008-023.htm", "http://www.debian.org/security/2008/dsa-1449", "http://www.debian.org/security/2008/dsa-1450", "http://www.redhat.com/support/errata/RHSA-2007-0969.html", "http://www.securityfocus.com/archive/1/485936/100/0/threaded", "http://www.securityfocus.com/archive/1/486859/100/0/threaded", "http://www.securityfocus.com/bid/25973", "http://www.securitytracker.com/id?1018782", "http://www.ubuntu.com/usn/usn-533-1", "http://www.vmware.com/security/advisories/VMSA-2008-0001.html", "http://www.vupen.com/english/advisories/2007/3417", "http://www.vupen.com/english/advisories/2008/0064", "https://bugzilla.redhat.com/show_bug.cgi?id=320041", "https://issues.rpath.com/browse/RPL-1757", "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10101", "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00144.html"]
7+
8+
[[affected]]
9+
pkg = "util_linux_jll"
10+
ranges = ["< 2.39.3+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2007-5191"
14+
imported = 2025-10-21T17:21:19.245Z
15+
modified = 2025-04-09T00:30:58.490Z
16+
published = 2007-10-04T16:17:00.000Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2007-5191"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2007-5191"
19+
```
20+
21+
# mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong ...
22+
23+
mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns8z6umm-1of04pj"
4+
modified = 2025-10-21T17:21:19.246Z
5+
upstream = ["CVE-2013-0157"]
6+
references = ["http://bugs.debian.org/697464", "http://marc.info/?l=oss-security&m=135749410312247&w=2", "http://osvdb.org/88953", "http://rhn.redhat.com/errata/RHSA-2013-0517.html", "http://www.mandriva.com/security/advisories?name=MDVSA-2013:154", "https://bugzilla.redhat.com/show_bug.cgi?id=892330", "http://bugs.debian.org/697464", "http://marc.info/?l=oss-security&m=135749410312247&w=2", "http://osvdb.org/88953", "http://rhn.redhat.com/errata/RHSA-2013-0517.html", "http://www.mandriva.com/security/advisories?name=MDVSA-2013:154", "https://bugzilla.redhat.com/show_bug.cgi?id=892330"]
7+
8+
[[affected]]
9+
pkg = "util_linux_jll"
10+
ranges = ["< 2.39.3+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2013-0157"
14+
imported = 2025-10-21T17:21:19.246Z
15+
modified = 2025-04-11T00:51:21.963Z
16+
published = 2014-01-21T18:55:09.007Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2013-0157"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2013-0157"
19+
```
20+
21+
# (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users...
22+
23+
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.
24+

0 commit comments

Comments
 (0)