Lucene search

K
mageiaGentoo FoundationMGASA-2017-0072
HistoryMar 03, 2017 - 1:09 p.m.

Updated util-linux packages fix security vulnerability

2017-03-0313:09:43
Gentoo Foundation
advisories.mageia.org
7

0.0004 Low

EPSS

Percentile

5.2%

With the su command from util-linux before 2.29.2, it is possible for any local user to send SIGKILL to other processes with root privileges. To exploit this, the user must be able to perform su with a successful login. SIGKILL can only be sent to processes which were executed after the su process. It is not possible to send SIGKILL to processes which were already running (CVE-2017-2616).

OSVersionArchitecturePackageVersionFilename
Mageia5noarchutil-linux< 2.25.2-3.5util-linux-2.25.2-3.5.mga5