Virtuozzo 7 : libblkid / libblkid-devel / libmount / etc (VZLSA-2017-0907)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote Virtuozzo host is missing a security update.

Description :

An update for util-linux is now available for Red Hat Enterprise Linux

Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

The util-linux packages contain a large variety of low-level system
utilities that are necessary for a Linux system to function. Among
others, these include the fdisk configuration tool and the login

Security Fix(es) :

* A race condition was found in the way su handled the management of
child processes. A local authenticated attacker could use this flaw to
kill other processes with root privileges under specific conditions.

Red Hat would like to thank Tobias StAPckmann for reporting this

Bug Fix(es) :

* The 'findmnt --target <path>' command prints all file systems where
the mount point directory is <path>. Previously, when used in the
chroot environment, 'findmnt --target <path>' incorrectly displayed
all mount points. The command has been fixed so that it now checks the
mount point path and returns information only for the relevant mount
point. (BZ#1414481)

Note that Tenable Network Security has attempted to extract the
preceding description block directly from the corresponding Red Hat
security advisory. Virtuozzo provides no description for VZLSA
advisories. Tenable has attempted to automatically clean and format
it as much as possible without introducing additional issues.

See also :

Solution :

Update the affected libblkid / libblkid-devel / libmount / etc package.

Risk factor :

Low / CVSS Base Score : 1.9
CVSS Temporal Score : 1.6
Public Exploit Available : true

Family: Virtuozzo Local Security Checks

Nessus Plugin ID: 101446 ()

Bugtraq ID:

CVE ID: CVE-2017-2616

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now