Description
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1390-1 | procps security update |
Debian DSA |
DSA-4208-1 | procps security update |
EUVD |
EUVD-2018-11768 | procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users. |
Ubuntu USN |
USN-3658-1 | procps-ng vulnerabilities |
Ubuntu USN |
USN-3658-2 | procps-ng vulnerabilities |
References
History
Thu, 18 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Procps-ng Project
Subscribe
Procps-ng
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Workstation
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Tus
Subscribe
Schneider-electric
Subscribe
Struxureware Data Center Expert
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-12-18T11:37:47.265Z
Reserved: 2017-12-04T00:00:00.000Z
Link: CVE-2018-1124
Updated: 2024-08-05T03:51:48.632Z
Status : Modified
Published: 2018-05-23T13:29:00.263
Modified: 2024-11-21T03:59:13.937
Link: CVE-2018-1124
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN