Your submission was sent successfully! Close

CVE-2018-1124

Published: 17 May 2018

procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.

Notes

AuthorNote
mdeslaur
[PATCH 074/117] proc/readproc.c: Fix bugs and overflows in
file2strvec().
Priority

Medium

CVSS 3 base score: 7.8

Status

Package Release Status
procps
Launchpad, Ubuntu, Debian
artful
Released (2:3.3.12-1ubuntu2.1)
bionic
Released (2:3.3.12-3ubuntu1.1)
precise
Released (1:3.2.8-11ubuntu6.5)
trusty
Released (1:3.3.9-1ubuntu2.3)
upstream
Released (3.3.15)
xenial
Released (2:3.3.10-4ubuntu2.4)
Patches:
upstream: https://gitlab.com/procps-ng/procps/commit/36c350f07c75aabf747fb833f52a234ae5781b20