CVE-2021-43411

An issue was discovered in GNU Hurd before 0.9 20210404-9. When trying to exec a setuid executable, there's a window of time when the process already has the new privileges, but still refers to the old task and is accessible through the old process port. This can be exploited to get full root access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:hurd:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:29

Type Values Removed Values Added
References () https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html - Exploit, Mailing List, Vendor Advisory () https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html - Exploit, Mailing List, Vendor Advisory
References () https://salsa.debian.org/hurd-team/hurd/-/blob/4d1b079411e2f40576e7b58f9b5b78f733a2beda/debian/patches/0034-proc-Use-UIDs-for-evaluating-permissions.patch - Mailing List, Patch, Third Party Advisory () https://salsa.debian.org/hurd-team/hurd/-/blob/4d1b079411e2f40576e7b58f9b5b78f733a2beda/debian/patches/0034-proc-Use-UIDs-for-evaluating-permissions.patch - Mailing List, Patch, Third Party Advisory
References () https://www.mail-archive.com/bug-hurd%40gnu.org/msg32112.html - () https://www.mail-archive.com/bug-hurd%40gnu.org/msg32112.html -

07 Nov 2023, 03:39

Type Values Removed Values Added
References
  • {'url': 'https://www.mail-archive.com/bug-hurd@gnu.org/msg32112.html', 'name': 'https://www.mail-archive.com/bug-hurd@gnu.org/msg32112.html', 'tags': ['Exploit', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://www.mail-archive.com/bug-hurd%40gnu.org/msg32112.html -

Information

Published : 2021-11-07 18:15

Updated : 2024-11-21 06:29


NVD link : CVE-2021-43411

Mitre link : CVE-2021-43411

CVE.ORG link : CVE-2021-43411


JSON object : View

Products Affected

gnu

  • hurd
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')