[CLSA-2026:1777940378] procps-ng: Fix of 2 CVEs
Type:
security
Severity:
Important
Release date:
2026-05-05 00:19:47 UTC
Description:
- CVE-2018-1123: ps DoS via outbuf overflows in pr_args/pr_comm/pr_fname caused by passing literal OUTBUF_SIZE instead of remaining buffer size - CVE-2018-1125: pgrep stack-buffer overflow in cmdline assembly via strncpy/strncat loop with int-bytes wraparound
Updated packages:
  • procps-ng-3.3.10-26.amzn2.tuxcare.els1.i686.rpm
    sha:8c6743662db22525520eec9d1aaceb5fae3e1116e4ad21bcc469e0a36a7885cd
  • procps-ng-3.3.10-26.amzn2.tuxcare.els1.x86_64.rpm
    sha:a7eca0516e2b3a606bc341f31bb932590e73e7a050e8d06cddb6d1fc1d6c6348
  • procps-ng-devel-3.3.10-26.amzn2.tuxcare.els1.x86_64.rpm
    sha:2551875eadbb38324ddec946408f3d2f680d99c29c35e9e21bdd30a90cb2fcfe
  • procps-ng-i18n-3.3.10-26.amzn2.tuxcare.els1.x86_64.rpm
    sha:1bb9629917f050c817c6e070088356d5639801ca55dcba849eae0a1dd3dcd5f8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.