Multiple vulnerabilities have been found in procps, the worst of which could result in the execution of arbitrary code.
Package | sys-process/procps on all architectures |
---|---|
Affected versions | < 3.3.15-r1 |
Unaffected versions | >= 3.3.15-r1 |
A bunch of small useful utilities that give information about processes using the /proc filesystem.
Multiple vulnerabilities have been discovered in procps. Please review the CVE identifiers referenced below for details.
A local attacker could execute arbitrary code, escalate privileges, or cause a Denial of Service condition.
There is no known workaround at this time.
All procps users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-process/procps-3.3.15-r1"
Release date
May 30, 2018
Latest revision
May 30, 2018: 1
Severity
normal
Exploitable
local
Bugzilla entries