Procps Project Procps vulnerabilities
7 known vulnerabilities affecting procps_project/procps.
Total CVEs
7
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM1LOW1
Vulnerabilities
Page 1 of 1
CVE-2023-4016LOWCVSS 3.3≥ 3.3.0, ≤ 4.0.32023-08-02
CVE-2023-4016 [LOW] CWE-122 CVE-2023-4016: Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a ma
Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
nvdosv
CVE-2018-1121MEDIUMCVSS 5.9PoC≤ 3.3.152018-06-13
CVE-2018-1121 [MEDIUM] CWE-367 CVE-2018-1121: procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_
procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged atta
nvd
CVE-2018-1123HIGHCVSS 7.5PoC≥ 0, < 2:3.3.15-12018-05-23
CVE-2018-1123 [HIGH] CVE-2018-1123: procps-ng before version 3
procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
osv
CVE-2018-1122HIGHCVSS 7.0PoC≥ 0, < 2:3.3.15-12018-05-23
CVE-2018-1122 [HIGH] CVE-2018-1122: procps-ng before version 3
procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
osv
CVE-2018-1124HIGHCVSS 7.8PoC≥ 0, < 2:3.3.15-12018-05-23
CVE-2018-1124 [HIGH] CVE-2018-1124: procps-ng before version 3
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
osv
CVE-2018-1126HIGHCVSS 7.8≥ 0, < 2:3.3.15-12018-05-23
CVE-2018-1126 [HIGH] CVE-2018-1126: procps-ng before version 3
procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.
osv
CVE-2018-1125HIGHCVSS 7.5≥ 0, < 2:3.3.15-12018-05-23
CVE-2018-1125 [HIGH] CVE-2018-1125: procps-ng before version 3
procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
osv