CVE-2021-43411
Summary
| CVE | CVE-2021-43411 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-11-07 18:15:00 UTC |
| Updated | 2023-11-07 03:39:00 UTC |
| Description | An issue was discovered in GNU Hurd before 0.9 20210404-9. When trying to exec a setuid executable, there's a window of time when the process already has the new privileges, but still refers to the old task and is accessible through the old process port. This can be exploited to get full root access. |
Risk And Classification
Problem Types: CWE-362
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| How do I disclose a vulnerability? | MISC | lists.gnu.org | |
| [VULN 3/4] setuid exec race | www.mail-archive.com | ||
| [VULN 3/4] setuid exec race | MISC | www.mail-archive.com | |
| debian/patches/0034-proc-Use-UIDs-for-evaluating-permissions.patch · 4d1b079411e2f40576e7b58f9b5b78f733a2beda · Maintaining of the Hurd / hurd · GitLab | MISC | salsa.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.