MGASA-2017-0072

Source
https://advisories.mageia.org/MGASA-2017-0072.html
Import Source
https://advisories.mageia.org/MGASA-2017-0072.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0072
Related
Published
2017-03-03T10:09:43Z
Modified
2017-03-03T10:01:19Z
Summary
Updated util-linux packages fix security vulnerability
Details

With the su command from util-linux before 2.29.2, it is possible for any local user to send SIGKILL to other processes with root privileges. To exploit this, the user must be able to perform su with a successful login. SIGKILL can only be sent to processes which were executed after the su process. It is not possible to send SIGKILL to processes which were already running (CVE-2017-2616).

References
Credits

Affected packages

Mageia:5 / util-linux

Package

Name
util-linux
Purl
pkg:rpm/mageia/util-linux?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.25.2-3.5.mga5

Ecosystem specific

{
    "section": "core"
}