First published: Mon Mar 19 2018(Updated: )
The Gentoo app-admin/collectd package before 5.7.2-r1 sets the ownership of PID file directory to the collectd account, which might allow local users to kill arbitrary processes by leveraging access to this account for PID file modification before a root script sends a SIGKILL (when the service is stopped).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
collectd | <=5.7.2 | |
collectd | =5.7.2-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18240 is considered a medium severity vulnerability due to its potential to allow local users to affect process management.
To fix CVE-2017-18240, upgrade the app-admin/collectd package to version 5.7.2-r1 or later.
CVE-2017-18240 may allow a malicious local user to kill arbitrary processes by manipulating PID files.
Versions of collectd before 5.7.2-r1 are affected by CVE-2017-18240.
CVE-2017-18240 is a local vulnerability that requires user access to exploit.