Vulnerability CVE-2018-1121: Information

Description

procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps and procps-ng up to version 3.3.15, newer versions might be affected also.

Severity: MEDIUM (5.9) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Published: June 13, 2018
Modified: June 30, 2020
Error type identifier: CWE-362

Fixed packages

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
  • Exploit
  • Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
  • Issue Tracking
  • Third Party Advisory
[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report
  • Exploit
  • Mailing List
  • Third Party Advisory
44806
  • Exploit
  • Third Party Advisory
  • VDB Entry
104214
  • Third Party Advisory
  • VDB Entry
    1. Configuration 1

      cpe:2.3:a:procps_project:procps:*:*:*:*:*:*:*:*
      End including
      3.3.15