procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2018-05-23 06:29
Updated : 2020-09-09 07:58
NVD link : CVE-2018-1124
Mitre link : CVE-2018-1124
JSON object : View
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux
- enterprise_linux_workstation
- enterprise_linux_server
canonical
- ubuntu_linux
schneider-electric
- struxureware_data_center_expert
opensuse
- leap
debian
- debian_linux
procps-ng_project
- procps-ng