CVE-2018-1121
Summary
| CVE | CVE-2018-1121 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-06-13 20:29:00 UTC |
| Updated | 2020-06-30 16:15:00 UTC |
| Description | procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps and procps-ng up to version 3.3.15, newer versions might be affected also. |
Risk And Classification
Problem Types: CWE-362
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Procps Project | Procps | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt | MISC | www.qualys.com | Exploit, Third Party Advisory |
| Procps-ng Procps Multiple Security Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| oss-sec: Qualys Security Advisory - Procps-ng Audit Report | MLIST | seclists.org | Exploit, Mailing List, Third Party Advisory |
| Bug 1575473 – CVE-2018-1121 procps-ng, procps: process hiding through race condition enumerating /proc | CONFIRM | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| Procps-ng - Multiple Vulnerabilities - Linux local Exploit | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.