Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2017-2616

Published: 22 February 2017

A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.

Notes

AuthorNote
sbeattie
ubuntu uses su from shadow package, not util-linux up until
(2.32-0.2)

Priority

Medium

CVSS 3 base score: 4.7

Status

Package Release Status
shadow
Launchpad, Ubuntu, Debian
artful
Released (1:4.2-3.2ubuntu2)
bionic
Released (1:4.2-3.2ubuntu2)
cosmic
Released (1:4.2-3.2ubuntu2)
disco
Released (1:4.2-3.2ubuntu2)
precise
Released (1:4.1.4.2+svn3283-3ubuntu5.2)
trusty
Released (1:4.1.5.1-1ubuntu9.4)
upstream
Released (1:4.4-4)
xenial
Released (1:4.2-3.1ubuntu5.2)
yakkety
Released (1:4.2-3.2ubuntu1.16.10.1)
zesty
Released (1:4.2-3.2ubuntu1.17.04.1)
Patches:
upstream: https://github.com/shadow-maint/shadow/commit/08fd4b69e84364677a10e519ccb25b71710ee686

util-linux
Launchpad, Ubuntu, Debian
artful Ignored
(reached end-of-life)
bionic Not vulnerable
(2.31.1-0.4ubuntu3.3)
cosmic Not vulnerable
(2.31.1-0.4ubuntu3.3)
disco Not vulnerable
(2.31.1-0.4ubuntu3.3)
precise Not vulnerable
(binary not built)
trusty Not vulnerable
(binary not built)
upstream
Released (2.29.2-1)
xenial Not vulnerable
(binary not built)
yakkety Ignored
(reached end-of-life)
zesty Ignored
(reached end-of-life)
Patches:

upstream: https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891