procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2018-05-23 13:29
Updated : 2020-09-09 14:58
NVD link : CVE-2018-1124
Mitre link : CVE-2018-1124
CVE.ORG link : CVE-2018-1124
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux
- enterprise_linux_workstation
canonical
- ubuntu_linux
procps-ng_project
- procps-ng
opensuse
- leap
debian
- debian_linux
schneider-electric
- struxureware_data_center_expert