SB2019011024 - Command injection in linux-pam (Alpine package)
Published: January 10, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Command injection (CVE-ID: CVE-2018-19788)
The vulnerability allows a local authenticated attacker to execute arbitrary commands on the target system.
The vulnerability exists due to PolicyKit's improper validation of permission requests for any low-privileged user with UID greater than INT_MAX, a constant in computer programming that defines what maximum value an integer variable can store, which equals to 2147483647 (in hexadecimal 0x7FFFFFFF). A local authenticated attacker with a uid greater than INT_MAX can execute any systemctl command.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=117cfaf0240976b412ebfb6fa8233e9283d113a4
- https://git.alpinelinux.org/aports/commit/?id=5447937033d54021a292bea5bd51ec07afccde14
- https://git.alpinelinux.org/aports/commit/?id=ec563f54fcb69061dbbeb7ac0d4bc08455148f90
- https://git.alpinelinux.org/aports/commit/?id=98957a9d69834988d1951cc70c0e76520f5801f7
- https://git.alpinelinux.org/aports/commit/?id=d2bfa8f71e8555beb08af04d58bb2cea9138c779
- https://git.alpinelinux.org/aports/commit/?id=07672f5bebbe2bf73687ff5818ca7ca7f1fdb23c
- https://git.alpinelinux.org/aports/commit/?id=0b52876162f2412968ff130fbb6ab254a1afad01
- https://git.alpinelinux.org/aports/commit/?id=9f939bc197b3bb38267a81e41732fe53a2373f5c
- https://git.alpinelinux.org/aports/commit/?id=a0b66a149533ede4da0e12447d96958233dbec8e