Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-2189

Опубликовано: 13 авг. 2019
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2019-2189: procps-ng security and bug fix update (MODERATE)

[3.3.10-26]

  • free: unreclaimable slabs counted into free memory, used mem incorrect
  • Resolves: rhbz#1699264

[3.3.10-25]

  • ps: recognize SCHED_DEADLINE in CLS field, upstream backport
  • Resolves: rhbz#1692843

[3.3.10-24]

  • top: Do not default to the cwd in configs_read()
  • Resolves: rhbz#1577023

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

procps-ng

3.3.10-26.el7

procps-ng-devel

3.3.10-26.el7

procps-ng-i18n

3.3.10-26.el7

Oracle Linux x86_64

procps-ng

3.3.10-26.el7

procps-ng-devel

3.3.10-26.el7

procps-ng-i18n

3.3.10-26.el7

Связанные CVE

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

CVSS3: 6.7
redhat
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

CVSS3: 7.3
nvd
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

CVSS3: 7.3
debian
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege esc ...

CVSS3: 7
github
больше 3 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.