SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Util-linux Vendors:   kernel.org
(Red Hat Issues Fix) Util-linux Child Process Race Condition Lets Local Users Kill Root-Owned Processes in Certain Cases
SecurityTracker Alert ID:  1038272
SecurityTracker URL:  http://securitytracker.com/id/1038272
CVE Reference:   CVE-2017-2616   (Links to External Site)
Date:  Apr 14 2017
Impact:   Denial of service via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Util-linux. A local user can cause denial of service conditions on the target system.

A local user with 'su' privileges can exploit a race condition to send a SIGKILL message with root privileges to arbitrary processes started after the 'su' process starts to cause the target process to be killed.

Systems with 'su' compiled with PAM support are affected.

Tobias Stoeckmann reported this vulnerability.

Impact:   A local user can kill arbitrary processes with root privileges in certain cases.
Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://access.redhat.com/errata/RHSA-2017:0907

Vendor URL:  access.redhat.com/errata/RHSA-2017:0907 (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Apr 14 2017 Util-linux Child Process Race Condition Lets Local Users Kill Root-Owned Processes in Certain Cases



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC