[USN-3658-2] procps-ng vulnerabilities


–===============4389839268750142977==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-PCoOLVx+xFvYOb+lk+l7″

–=-PCoOLVx+xFvYOb+lk+l7
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3658-2
June 05, 2018

procps vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in procps-ng.

Software Description:
– procps: /proc file system utilities

Details:

USN-3658-1 fixed a vulnerability in procps-ng. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0It was discovered that libprocps incorrectly handled the file2strvec(=
)
=C2=A0function. A local attacker could possibly use this to execute
=C2=A0arbitrary code. (CVE-2018-1124)

=C2=A0It was discovered that procps-ng incorrectly handled memory. A local
=C2=A0attacker could use this issue to cause a denial of service, or
=C2=A0possibly execute arbitrary code. (CVE-2018-1126)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 procps=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A01:3.2.8-11ubuntu6.5

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3658-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3658-1
=C2=A0 CVE-2018-1124, CVE-2018-1126
–=-PCoOLVx+xFvYOb+lk+l7
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=mpHr
—–END PGP SIGNATURE—–

–=-PCoOLVx+xFvYOb+lk+l7–

–===============4389839268750142977==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============4389839268750142977==–