ELSA-2018-1700

ELSA-2018-1700 - procps-ng security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2018-05-23

Description


[3.3.10-17.el7_5.2]
- check for truncation after calling snprintf()
- Related: CVE-2018-1124

[3.3.10-17.el7_5.1]
- fix integer overflows leading to heap overflow in file2strvec()
- Resolves: CVE-2018-1124


Related CVEs


CVE-2018-1124
CVE-2018-1126

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) procps-ng-3.3.10-17.el7_5.2.src.rpm761bd5f9f081f77132ae1c6d62e5b33f66cca422e18f335ec480fed9840b9ae0ELBA-2023-12926ol7_aarch64_latest
procps-ng-3.3.10-17.el7_5.2.src.rpm761bd5f9f081f77132ae1c6d62e5b33f66cca422e18f335ec480fed9840b9ae0ELBA-2023-12926ol7_aarch64_optional_latest
procps-ng-3.3.10-17.el7_5.2.src.rpm761bd5f9f081f77132ae1c6d62e5b33f66cca422e18f335ec480fed9840b9ae0ELBA-2023-12926ol7_aarch64_u5_base
procps-ng-3.3.10-17.el7_5.2.aarch64.rpm33fa52264207ba6ff615cd1ffed6bde43479a7c3e40ee145fc1ed74eebe1a586ELBA-2023-12926ol7_aarch64_latest
procps-ng-3.3.10-17.el7_5.2.aarch64.rpm33fa52264207ba6ff615cd1ffed6bde43479a7c3e40ee145fc1ed74eebe1a586ELBA-2023-12926ol7_aarch64_u5_base
procps-ng-devel-3.3.10-17.el7_5.2.aarch64.rpmc639083080eb23bc023814a36bd45574c0ed0da169091e0ac495c28ac63da647ELBA-2023-12926ol7_aarch64_optional_latest
procps-ng-i18n-3.3.10-17.el7_5.2.aarch64.rpma3e48f6c6a0d41526f54dec1d4e051a236168d694f950e20c67436c3486640cbELBA-2023-12926ol7_aarch64_optional_latest
Oracle Linux 7 (x86_64) procps-ng-3.3.10-17.el7_5.2.src.rpm761bd5f9f081f77132ae1c6d62e5b33f66cca422e18f335ec480fed9840b9ae0ELBA-2023-12926ol7_x86_64_latest
procps-ng-3.3.10-17.el7_5.2.src.rpm761bd5f9f081f77132ae1c6d62e5b33f66cca422e18f335ec480fed9840b9ae0ELBA-2023-12926ol7_x86_64_optional_archive
procps-ng-3.3.10-17.el7_5.2.src.rpm761bd5f9f081f77132ae1c6d62e5b33f66cca422e18f335ec480fed9840b9ae0ELBA-2023-12926ol7_x86_64_optional_latest
procps-ng-3.3.10-17.el7_5.2.src.rpm761bd5f9f081f77132ae1c6d62e5b33f66cca422e18f335ec480fed9840b9ae0ELBA-2023-12926ol7_x86_64_u5_patch
procps-ng-3.3.10-17.el7_5.2.i686.rpmf57a1b81e63f6ad87c96b378acf28d9e780a1cfa2ac4af142fe4d8db9ebcf4fbELBA-2023-12926ol7_x86_64_latest
procps-ng-3.3.10-17.el7_5.2.i686.rpmf57a1b81e63f6ad87c96b378acf28d9e780a1cfa2ac4af142fe4d8db9ebcf4fbELBA-2023-12926ol7_x86_64_u5_patch
procps-ng-3.3.10-17.el7_5.2.x86_64.rpm889f46769c151e2b73c0a55e4e7c1863c2157164f52767ea2c9cfa21ffc61a78ELBA-2023-12926exadata_dbserver_19.1.0.0.0_x86_64_base
procps-ng-3.3.10-17.el7_5.2.x86_64.rpm889f46769c151e2b73c0a55e4e7c1863c2157164f52767ea2c9cfa21ffc61a78ELBA-2023-12926ol7_x86_64_latest
procps-ng-3.3.10-17.el7_5.2.x86_64.rpm889f46769c151e2b73c0a55e4e7c1863c2157164f52767ea2c9cfa21ffc61a78ELBA-2023-12926ol7_x86_64_u5_patch
procps-ng-devel-3.3.10-17.el7_5.2.i686.rpm3108f22a034039c620881ee14fe16d7fdd0309e3e8d77a10624ea69ee4056992ELBA-2023-12926ol7_x86_64_optional_archive
procps-ng-devel-3.3.10-17.el7_5.2.i686.rpm3108f22a034039c620881ee14fe16d7fdd0309e3e8d77a10624ea69ee4056992ELBA-2023-12926ol7_x86_64_optional_latest
procps-ng-devel-3.3.10-17.el7_5.2.x86_64.rpm7a3825d7a9ee477687feec56dfbcb0a0230ee286712b50822a6ff81bd63f3f06ELBA-2023-12926ol7_x86_64_optional_archive
procps-ng-devel-3.3.10-17.el7_5.2.x86_64.rpm7a3825d7a9ee477687feec56dfbcb0a0230ee286712b50822a6ff81bd63f3f06ELBA-2023-12926ol7_x86_64_optional_latest
procps-ng-i18n-3.3.10-17.el7_5.2.x86_64.rpm385093a96a235b3088084a8c3a11b008e86ee00dd961822096f34bff0e2c38d8ELBA-2023-12926ol7_x86_64_optional_archive
procps-ng-i18n-3.3.10-17.el7_5.2.x86_64.rpm385093a96a235b3088084a8c3a11b008e86ee00dd961822096f34bff0e2c38d8ELBA-2023-12926ol7_x86_64_optional_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete