CVE-2017-18226

NameCVE-2017-18226
DescriptionThe Gentoo net-im/jabberd2 package through 2.6.1 sets the ownership of /var/run/jabber to the jabber account, which might allow local users to kill arbitrary processes by leveraging access to this account for PID file modification before a root script executes a "kill -TERM `cat /var/run/jabber/filename.pid`" command.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs902783

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
jabberd2 (PTS)stretch (security), stretch (lts), stretch2.4.0-3+deb9u1vulnerable
buster2.7.0-1vulnerable
bullseye2.7.0-2vulnerable
bookworm2.7.0-4vulnerable
sid, trixie2.7.0-7vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
jabberd2source(unstable)(unfixed)low902783

Notes

[bookworm] - jabberd2 <ignored> (Minor issue, default init system not affected)
[bullseye] - jabberd2 <ignored> (Minor issue, default init system not affected)
[buster] - jabberd2 <ignored> (Minor issue, default init system not affected)
[stretch] - jabberd2 <ignored> (Minor issue, default init system not affected)
https://bugs.gentoo.org/631068

Search for package or bug name: Reporting problems