procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1390-1 | procps security update |
Debian DSA |
DSA-4208-1 | procps security update |
EUVD |
EUVD-2018-11768 | procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users. |
Ubuntu USN |
USN-3658-1 | procps-ng vulnerabilities |
Ubuntu USN |
USN-3658-2 | procps-ng vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 18 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-12-18T11:37:47.265Z
Reserved: 2017-12-04T00:00:00.000Z
Link: CVE-2018-1124
Updated: 2024-08-05T03:51:48.632Z
Status : Modified
Published: 2018-05-23T13:29:00.263
Modified: 2024-11-21T03:59:13.937
Link: CVE-2018-1124
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN