A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "login", "binary_version": "1:4.1.5.1-1ubuntu9.4" }, { "binary_name": "login-dbgsym", "binary_version": "1:4.1.5.1-1ubuntu9.4" }, { "binary_name": "passwd", "binary_version": "1:4.1.5.1-1ubuntu9.4" }, { "binary_name": "passwd-dbgsym", "binary_version": "1:4.1.5.1-1ubuntu9.4" }, { "binary_name": "uidmap", "binary_version": "1:4.1.5.1-1ubuntu9.4" }, { "binary_name": "uidmap-dbgsym", "binary_version": "1:4.1.5.1-1ubuntu9.4" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "login", "binary_version": "1:4.2-3.1ubuntu5.2" }, { "binary_name": "login-dbgsym", "binary_version": "1:4.2-3.1ubuntu5.2" }, { "binary_name": "passwd", "binary_version": "1:4.2-3.1ubuntu5.2" }, { "binary_name": "passwd-dbgsym", "binary_version": "1:4.2-3.1ubuntu5.2" }, { "binary_name": "uidmap", "binary_version": "1:4.2-3.1ubuntu5.2" }, { "binary_name": "uidmap-dbgsym", "binary_version": "1:4.2-3.1ubuntu5.2" } ] }