Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2017-2616: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

SUSE: CVE-2017-2616: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:L/AC:M/Au:N/C:N/I:N/A:C)
Published
02/23/2017
Created
07/25/2018
Added
02/24/2017
Modified
02/04/2022

Description

A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.

Solution(s)

  • suse-upgrade-coreutils
  • suse-upgrade-coreutils-lang
  • suse-upgrade-coreutils-x86
  • suse-upgrade-libblkid-devel
  • suse-upgrade-libblkid-devel-static
  • suse-upgrade-libblkid1
  • suse-upgrade-libblkid1-32bit
  • suse-upgrade-libfdisk-devel
  • suse-upgrade-libfdisk1
  • suse-upgrade-libmount-devel
  • suse-upgrade-libmount1
  • suse-upgrade-libmount1-32bit
  • suse-upgrade-libsmartcols-devel
  • suse-upgrade-libsmartcols1
  • suse-upgrade-libuuid-devel
  • suse-upgrade-libuuid-devel-static
  • suse-upgrade-libuuid1
  • suse-upgrade-libuuid1-32bit
  • suse-upgrade-python-libmount
  • suse-upgrade-sles12-docker-image
  • suse-upgrade-sles12sp1-docker-image
  • suse-upgrade-sles12sp2-docker-image
  • suse-upgrade-util-linux
  • suse-upgrade-util-linux-lang
  • suse-upgrade-util-linux-systemd
  • suse-upgrade-uuidd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;