Fixed
Created: May 24, 2018
Updated: Dec 16, 2018
Resolved Date: Nov 18, 2018
Found In Version: 6.0.0.36
Fix Version: 6.0.0.38
Severity: Standard
Applicable for: Wind River Linux 6
Component/s: Userspace
Local Privilege Escalation in libprocps (CVE-2018-1124)
An attacker can exploit an integer overflow in libprocps's
file2strvec() function and carry out an LPE when another user,
administrator, or script executes a vulnerable utility (pgrep, pidof,
pkill, and w are vulnerable by default; other utilities are vulnerable
if executed with non-default options). Moreover, an attacker's process
running inside a container can trigger this vulnerability in a utility
running outside the container: the attacker can exploit this userland
vulnerability and break out of the container or chroot. We will
publish our proof-of-concept exploits in the near future.
https://security.archlinux.org/CVE-2018-1124
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt