USN-3658-3: procps-ng vulnerabilities
16 August 2018
Several security issues were fixed in procps-ng.
Releases
Packages
- procps - /proc file system utilities
Details
USN-3658-1 fixed a vulnerability in procps-ng. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that the procps-ng top utility incorrectly read its
configuration file from the current working directory. A local attacker
could possibly use this issue to escalate privileges. (CVE-2018-1122)
It was discovered that the procps-ng ps tool incorrectly handled memory. A
local user could possibly use this issue to cause a denial of service.
(CVE-2018-1123)
It was discovered that the procps-ng pgrep utility incorrectly handled
memory. A local attacker could possibly use this issue to cause de denial
of service. (CVE-2018-1125)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3658-1: libprocps3, libprocps-dev, libprocps4-dev, libprocps3-dev, procps, libprocps6, libprocps4