Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:2451-2

Опубликовано: 26 нояб. 2018
Источник: suse-cvrf

Описание

Security update for procps

This update for procps fixes the following security issues:

  • CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top with HOME unset in an attacker-controlled directory, the attacker could have achieved privilege escalation by exploiting one of several vulnerabilities in the config_file() function (bsc#1092100).
  • CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maped a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service) (bsc#1092100).
  • CVE-2018-1124: Prevent multiple integer overflows leading to a heap corruption in file2strvec function. This allowed a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users (bsc#1092100).
  • CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
  • CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent truncation/integer overflow issues (bsc#1092100).

Список пакетов

SUSE Linux Enterprise Desktop 12 SP3
libprocps3-3.3.9-11.14.1
procps-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3
libprocps3-3.3.9-11.14.1
procps-3.3.9-11.14.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
libprocps3-3.3.9-11.14.1
procps-3.3.9-11.14.1
SUSE Linux Enterprise Software Development Kit 12 SP3
procps-devel-3.3.9-11.14.1

Описание

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1
SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1

Ссылки

Описание

procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1
SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1

Ссылки

Описание

procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1
SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1

Ссылки

Описание

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1
SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1

Ссылки

Описание

procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1
SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1
SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1

Ссылки
Уязвимость SUSE-SU-2018:2451-2