Bug 1482479 (CVE-2017-12847) - CVE-2017-12847 nagios: Incorrect permissions for PID file
Summary: CVE-2017-12847 nagios: Incorrect permissions for PID file
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2017-12847
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1482480 1482481
Blocks: 1482483
TreeView+ depends on / blocked
 
Reported: 2017-08-17 11:40 UTC by Adam Mariš
Modified: 2020-12-14 10:24 UTC (History)
33 users (show)

Fixed In Version: nagios 4.3.3
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-08-06 13:18:25 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2017-08-17 11:40:12 UTC
It was found that nagios daemon creates its PID file after dropping privileges, which allows to change its content by non-root user with PID of any other process, resulting into denial-of-service when daemon is stopped.

Upstream bug:

https://github.com/NagiosEnterprises/nagioscore/issues/404

References:

http://seclists.org/oss-sec/2017/q3/305

Comment 1 Adam Mariš 2017-08-17 11:40:49 UTC
Created nagios tracking bugs for this issue:

Affects: epel-all [bug 1482480]
Affects: fedora-all [bug 1482481]

Comment 2 Jason Shepherd 2017-08-21 02:39:59 UTC
There are no other processes within PID namespace for Nagios container in RHMAP. Closing as WONTFIX

Comment 3 Joshua Padman 2019-08-06 09:50:43 UTC
This vulnerability is out of security support scope for the following product:

 * Red Hat Mobile Application Platform

 Please refer to https://access.redhat.com/support/policy/updates/rhmap for more details

Comment 4 Product Security DevOps Team 2019-08-06 13:18:25 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2017-12847


Note You need to log in before you can comment on or make changes to this bug.