Security update for procps
Announcement ID: | SUSE-SU-2018:2042-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities can now be installed.
Description:
This update for procps fixes the following security issues:
- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top with HOME unset in an attacker-controlled directory, the attacker could have achieved privilege escalation by exploiting one of several vulnerabilities in the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maped a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap corruption in file2strvec function. This allowed a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent truncation/integer overflow issues (bsc#1092100).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-procps-13699=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-procps-13699=1
Package List:
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- procps-3.2.7-152.31.1
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- procps-3.2.7-152.31.1
References:
- https://www.suse.com/security/cve/CVE-2018-1122.html
- https://www.suse.com/security/cve/CVE-2018-1123.html
- https://www.suse.com/security/cve/CVE-2018-1124.html
- https://www.suse.com/security/cve/CVE-2018-1125.html
- https://www.suse.com/security/cve/CVE-2018-1126.html
- https://bugzilla.suse.com/show_bug.cgi?id=1092100