First published: Wed May 23 2018(Updated: )
It was discovered that the procps-ng top utility incorrectly read its configuration file from the current working directory. A local attacker could possibly use this issue to escalate privileges. (CVE-2018-1122) It was discovered that the procps-ng ps tool incorrectly handled memory. A local user could possibly use this issue to cause a denial of service. (CVE-2018-1123) It was discovered that libprocps incorrectly handled the file2strvec() function. A local attacker could possibly use this to execute arbitrary code. (CVE-2018-1124) It was discovered that the procps-ng pgrep utility incorrectly handled memory. A local attacker could possibly use this issue to cause de denial of service. (CVE-2018-1125) It was discovered that procps-ng incorrectly handled memory. A local attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. (CVE-2018-1126)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libprocps6 | <2:3.3.12-3ubuntu1.1 | 2:3.3.12-3ubuntu1.1 |
=18.04 | ||
All of | ||
ubuntu/procps | <2:3.3.12-3ubuntu1.1 | 2:3.3.12-3ubuntu1.1 |
=18.04 | ||
All of | ||
ubuntu/libprocps6 | <2:3.3.12-1ubuntu2.1 | 2:3.3.12-1ubuntu2.1 |
=17.10 | ||
All of | ||
ubuntu/procps | <2:3.3.12-1ubuntu2.1 | 2:3.3.12-1ubuntu2.1 |
=17.10 | ||
All of | ||
ubuntu/libprocps4 | <2:3.3.10-4ubuntu2.4 | 2:3.3.10-4ubuntu2.4 |
=16.04 | ||
All of | ||
ubuntu/procps | <2:3.3.10-4ubuntu2.4 | 2:3.3.10-4ubuntu2.4 |
=16.04 | ||
All of | ||
ubuntu/libprocps3 | <1:3.3.9-1ubuntu2.3 | 1:3.3.9-1ubuntu2.3 |
=14.04 | ||
All of | ||
ubuntu/procps | <1:3.3.9-1ubuntu2.3 | 1:3.3.9-1ubuntu2.3 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of this advisory is USN-3658-1.
The severity of vulnerability USN-3658-1 is not specified.
Vulnerability USN-3658-1 affects the procps-ng package by enabling a local attacker to escalate privileges.
The vulnerabilities USN-3658-1 affect the following versions of the affected software: libprocps6 2:3.3.12-3ubuntu1.1, procps 2:3.3.12-3ubuntu1.1, libprocps6 2:3.3.12-1ubuntu2.1, procps 2:3.3.12-1ubuntu2.1, libprocps4 2:3.3.10-4ubuntu2.4, procps 2:3.3.10-4ubuntu2.4, libprocps3 1:3.3.9-1ubuntu2.3, procps 1:3.3.9-1ubuntu2.3.
To fix vulnerability USN-3658-1, you should update the affected software to the recommended versions: libprocps6 2:3.3.12-3ubuntu1.1, procps 2:3.3.12-3ubuntu1.1, libprocps6 2:3.3.12-1ubuntu2.1, procps 2:3.3.12-1ubuntu2.1, libprocps4 2:3.3.10-4ubuntu2.4, procps 2:3.3.10-4ubuntu2.4, libprocps3 1:3.3.9-1ubuntu2.3, procps 1:3.3.9-1ubuntu2.3.