SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Util-linux Vendors:   kernel.org
Util-linux Child Process Race Condition Lets Local Users Kill Root-Owned Processes in Certain Cases
SecurityTracker Alert ID:  1038271
SecurityTracker URL:  http://securitytracker.com/id/1038271
CVE Reference:   CVE-2017-2616   (Links to External Site)
Date:  Apr 14 2017
Impact:   Denial of service via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Util-linux. A local user can cause denial of service conditions on the target system.

A local user with 'su' privileges can exploit a race condition to send a SIGKILL message with root privileges to arbitrary processes started after the 'su' process starts to cause the target process to be killed.

Systems with 'su' compiled with PAM support are affected.

Tobias Stoeckmann reported this vulnerability.

Impact:   A local user can kill arbitrary processes with root privileges in certain cases.
Solution:   The vendor has issued a source code fix [in February 2017], available at:

https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891

Vendor URL:  git.kernel.org/pub/scm/utils/util-linux/util-linux.git (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Apr 14 2017 (Red Hat Issues Fix) Util-linux Child Process Race Condition Lets Local Users Kill Root-Owned Processes in Certain Cases
Red Hat has issued a fix for Red Hat Enterprise Linux 7.
May 5 2017 (Ubuntu Issues Fix for Shadow) Util-linux Child Process Race Condition Lets Local Users Kill Root-Owned Processes in Certain Cases
Ubuntu has issued a fix for Shadow for Ubuntu Linux 14.04 LTS, 16.04 LTS, 16.10, and 17.04.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC