Skip to content

Commit ab2d959

Browse files
authored
fix(e2e): update CVE-2018-1121 description (#1837)
1 parent 0aabc72 commit ab2d959

File tree

2 files changed

+9
-4
lines changed

2 files changed

+9
-4
lines changed

e2etests/testcase_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -945,7 +945,7 @@ var testCases = []testCase{
945945
{
946946
Name: "CVE-2018-1121",
947947
NamespaceName: "centos:7",
948-
Description: "DOCUMENTATION: Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. STATEMENT: The /proc filesystem is not a reliable mechanism to account for processes running on a system, as it is unable to offer snapshot semantics. Short-lived processes have always been able to escape detection by tools that monitor /proc. This CVE simply identifies a reliable way to do so using inotify. Process accounting for security purposes, or with a requirement to record very short-running processes and those attempting to evade detection, should be performed with more robust methods such as auditd(8) (the Linux Audit Daemon) or systemtap.",
948+
Description: "DOCUMENTATION: Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. STATEMENT: The /proc filesystem is not a reliable mechanism to account for processes running on a system, as it is unable to offer snapshot semantics. Short-lived processes have always been able to escape detection by tools that monitor /proc. This CVE simply identifies a reliable way to do so using inotify. Process accounting for security purposes, or with a requirement to record very short-running processes and those attempting to evade detection, should be performed with more robust methods such as auditd(8) (the Linux Audit Daemon) or systemtap. Because an attacker can achieve similar results whether this vulnerability is present or not, Red Hat assesses its impact as Low.",
949949
Link: "https://access.redhat.com/security/cve/CVE-2018-1121",
950950
Severity: "Low",
951951
Metadata: map[string]interface{}{

e2etests/utils.go

+8-3
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,9 @@ import (
1818
)
1919

2020
const (
21-
scannerHTTPEndpointEnv = "SCANNER_ENDPOINT"
22-
scannerGRPCEndpointEnv = "SCANNER_GRPC_ENDPOINT"
21+
scannerHTTPEndpointEnv = "SCANNER_ENDPOINT"
22+
scannerGRPCEndpointEnv = "SCANNER_GRPC_ENDPOINT"
23+
defaultMaxResponseMsgSize = 256 * 1024 * 1024 // 256MB
2324
)
2425

2526
func mustGetEnv(t *testing.T, key string) string {
@@ -37,7 +38,11 @@ func connectToScanner(t *testing.T) *grpc.ClientConn {
3738
clientTLSConfig := &tls.Config{
3839
InsecureSkipVerify: true,
3940
}
40-
conn, err := grpc.NewClient(gRPCEndpoint, grpc.WithTransportCredentials(credentials.NewTLS(clientTLSConfig)))
41+
conn, err := grpc.NewClient(
42+
gRPCEndpoint,
43+
grpc.WithTransportCredentials(credentials.NewTLS(clientTLSConfig)),
44+
grpc.WithDefaultCallOptions(grpc.MaxCallRecvMsgSize(defaultMaxResponseMsgSize)),
45+
)
4146
require.NoError(t, err)
4247
return conn
4348
}

0 commit comments

Comments
 (0)