CVE-2013-0157

Source
https://nvd.nist.gov/vuln/detail/CVE-2013-0157
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2013-0157.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2013-0157
Related
Published
2014-01-21T18:55:09Z
Modified
2024-06-30T12:01:22Z
Summary
[none]
Details

(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.

References

Affected packages

Debian:11 / util-linux

Package

Name
util-linux
Purl
pkg:deb/debian/util-linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.20.1-5.5

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / util-linux

Package

Name
util-linux
Purl
pkg:deb/debian/util-linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.20.1-5.5

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / util-linux

Package

Name
util-linux
Purl
pkg:deb/debian/util-linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.20.1-5.5

Ecosystem specific

{
    "urgency": "low"
}