An issue was discovered in GNU Hurd before 0.9 20210404-9. When trying to exec a setuid executable, there's a window of time when the process already has the new privileges, but still refers to the old task and is accessible through the old process port. This can be exploited to get full root access.
References
Link | Resource |
---|---|
https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html | Exploit Mailing List Vendor Advisory |
https://salsa.debian.org/hurd-team/hurd/-/blob/4d1b079411e2f40576e7b58f9b5b78f733a2beda/debian/patches/0034-proc-Use-UIDs-for-evaluating-permissions.patch | Mailing List Patch Third Party Advisory |
https://www.mail-archive.com/bug-hurd%40gnu.org/msg32112.html | |
https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html | Exploit Mailing List Vendor Advisory |
https://salsa.debian.org/hurd-team/hurd/-/blob/4d1b079411e2f40576e7b58f9b5b78f733a2beda/debian/patches/0034-proc-Use-UIDs-for-evaluating-permissions.patch | Mailing List Patch Third Party Advisory |
https://www.mail-archive.com/bug-hurd%40gnu.org/msg32112.html |
Configurations
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html - Exploit, Mailing List, Vendor Advisory | |
References | () https://salsa.debian.org/hurd-team/hurd/-/blob/4d1b079411e2f40576e7b58f9b5b78f733a2beda/debian/patches/0034-proc-Use-UIDs-for-evaluating-permissions.patch - Mailing List, Patch, Third Party Advisory | |
References | () https://www.mail-archive.com/bug-hurd%40gnu.org/msg32112.html - |
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-11-07 18:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43411
Mitre link : CVE-2021-43411
CVE.ORG link : CVE-2021-43411
JSON object : View
Products Affected
gnu
- hurd
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')