A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616 | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/96404 | vdb entry third party advisory |
https://access.redhat.com/errata/RHSA-2017:0907 | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2017-0654.html | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201706-02 | third party advisory vendor advisory |
https://www.debian.org/security/2017/dsa-3793 | third party advisory vendor advisory |
https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891 | third party advisory patch |
http://www.securitytracker.com/id/1038271 | vdb entry third party advisory |