{"id":"CVE-2017-2616","details":"A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.","modified":"2026-02-18T08:13:33.532236Z","published":"2018-07-27T19:29:00.207Z","related":["MGASA-2017-0072","SUSE-SU-2017:0553-1","SUSE-SU-2017:0554-1","SUSE-SU-2017:0555-1","SUSE-SU-2017:2699-1","SUSE-SU-2017:2700-1","SUSE-SU-2018:0866-1","openSUSE-SU-2024:11282-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0654.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/96404"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1038271"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0907"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616"},{"type":"ADVISORY","url":"https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201706-02"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3793"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616"},{"type":"FIX","url":"https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/util-linux/util-linux","events":[{"introduced":"0"},{"fixed":"dffab154d29a288aa171ff50263ecc8f2e14a891"}]}],"versions":["v2.10f","v2.10m","v2.10s","v2.11b","v2.11f","v2.11m","v2.11n","v2.11o","v2.11q","v2.11r","v2.11t","v2.11u","v2.11v","v2.11w","v2.11x","v2.11y","v2.12","v2.12a","v2.12b","v2.12d","v2.12h","v2.12i","v2.12j","v2.12k","v2.12l","v2.12m","v2.12o","v2.12p","v2.12pre","v2.12q","v2.12q-pre1","v2.12q-pre2","v2.12r","v2.12r-pre1","v2.13","v2.13-pre1","v2.13-pre2","v2.13-pre3","v2.13-pre4","v2.13-pre5","v2.13-pre6","v2.13-pre7","v2.13-rc1","v2.13-rc2","v2.13-rc3","v2.14","v2.14-rc1","v2.14-rc2","v2.14-rc3","v2.15","v2.15-rc1","v2.15-rc2","v2.16","v2.16-rc1","v2.16-rc2","v2.17","v2.17-rc1","v2.17-rc2","v2.17-rc3","v2.18","v2.18-rc1","v2.18-rc2","v2.19","v2.19-rc1","v2.19-rc2","v2.19-rc3","v2.2","v2.20","v2.20-rc1","v2.20-rc2","v2.21","v2.21-rc1","v2.21-rc2","v2.22","v2.22-rc1","v2.22-rc2","v2.23","v2.23-rc1","v2.23-rc2","v2.24","v2.24-rc1","v2.24-rc2","v2.25","v2.25-rc1","v2.25-rc2","v2.26","v2.26-rc1","v2.26-rc2","v2.27","v2.27-rc1","v2.27-rc2","v2.28","v2.28-rc1","v2.28-rc2","v2.29","v2.29-rc1","v2.29-rc2","v2.5","v2.7.1","v2.8","v2.9i","v2.9v"],"database_specific":{"vanir_signatures":[{"digest":{"line_hashes":["254079786612781049752644905636957680265","294274046992081162952296487750956254301","155366078330810701501756008017410041559","78695319910546846342802579537748469684","210996109935367098375678887685511520728","98137586820320364725232538173660781994","65933351546802506335929140347031909077","83420384204751459509845015373717758237","8908594386565829095929436899090658237","284598799330760466641087629932413299336","118406465720091467550330037024887373950","27401481682754817741697086533904416236","231859714326979121881491685551060707006","20655087195420992266114436202151015057"],"threshold":0.9},"id":"CVE-2017-2616-2c18f385","signature_type":"Line","deprecated":false,"target":{"file":"login-utils/su-common.c"},"source":"https://github.com/util-linux/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891","signature_version":"v1"},{"digest":{"length":2743,"function_hash":"315096434462509264335874598434674430021"},"id":"CVE-2017-2616-f61c0019","signature_type":"Function","deprecated":false,"target":{"function":"create_watching_parent","file":"login-utils/su-common.c"},"source":"https://github.com/util-linux/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891","signature_version":"v1"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-2616.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}