Debian LTS: DLA-1390-1: procps security update
Summary
top read its configuration from the current working directory if no
$HOME was configured. If top were started from a directory writable
by the attacker (such as /tmp) this could result in local privilege
escalation.
CVE-2018-1123
Denial of service against the ps invocation of another user.
CVE-2018-1124
An integer overflow in the file2strvec() function of libprocps could
result in local privilege escalation.
CVE-2018-1125
A stack-based buffer overflow in pgrep could result in denial
of service for a user using pgrep for inspecting a specially
crafted process.
CVE-2018-1126
Incorrect integer size parameters used in wrappers for standard C
allocators could cause integer truncation and lead to integer
overflow issues.
For Debian 7 "Wheezy", these problems have been fixed in version
1:3.3.3.3+deb7u1.
We recommend that you upgrade your procps packages.
The Debian LTS team would like to thank Abhijith PA for preparing this update.
Further information about D...
Package :procps