Un problema è stato scoperto nella funzione proc_pid_stack in fs / proc / base.c nel kernel di Linux attraverso 4.18.11. Non garantisce che solo root può ispezionare lo stack del kernel di un’attività arbitraria, consentendo un attaccante locale di sfruttare filante rimozione dello stack e kernel contenuto dello stack compito perdite. |
http://www.securityfocus.com/bid/105525 https://support.f5.com/csp/article/K27673650?utm_source=f5support&utm_medium=RSS https://marc.info/?l=linux-fsdevel&m=153806242024956&w=2 https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html https://access.redhat.com/errata/RHSA-2019:0512 https://access.redhat.com/errata/RHSA-2019:0514 https://access.redhat.com/errata/RHSA-2019:0831 https://access.redhat.com/errata/RHSA-2019:2473 http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html https://usn.ubuntu.com/3821-1/ https://usn.ubuntu.com/3821-2/ https://usn.ubuntu.com/3832-1/ https://usn.ubuntu.com/3835-1/ https://usn.ubuntu.com/3871-1/ https://usn.ubuntu.com/3871-3/ https://usn.ubuntu.com/3871-4/ https://usn.ubuntu.com/3871-5/ https://usn.ubuntu.com/3880-1/ https://usn.ubuntu.com/3880-2/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972 |
Vulnerabilità: CVE-2018-17972
