How to Buy
This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated util-linux and mount packages that fix two security issues are
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
The util-linux package contains a large variety of low-level system
utilities that are necessary for a Linux system to function.
The mount package contains the mount, umount, swapon and swapoff
A bug was found in the way the umount command is executed by normal
users. It may be possible for a user to gain elevated privileges if
the user is able to execute the 'umount -r' command on a mounted file
system. The file system will be re-mounted only with the 'readonly'
flag set, clearing flags such as 'nosuid' and 'noexec'. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2005-2876 to this issue.
This update also fixes a hardlink bug in the script command for Red
Hat Enterprise Linux 2.1. If a local user places a hardlinked file
named 'typescript' in a directory they have write access to, the file
will be overwritten if the user running script has write permissions
to the destination file. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2001-1494 to this
All users of util-linux and mount should upgrade to these updated
packages, which contain backported patches to correct these issues.
See also :
Update the affected losetup, mount and / or util-linux packages.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.3
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 20048 ()
Bugtraq ID: 14816
CVE ID: CVE-2001-1494CVE-2005-2876
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.