[ALSA-2023:7187] Low: procps-ng security update
Type:
security
Severity:
low
Release date:
2023-11-23
Description:
The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx. Security Fix(es): * procps: ps buffer overflow (CVE-2023-4016) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 procps-ng-devel-3.3.15-14.el8.aarch64.rpm 12dd320236733330314087d4ef66007e6aa756a319096b8dfb7d386c026b4c2a
aarch64 procps-ng-3.3.15-14.el8.aarch64.rpm 2bbfced407d90383e74fa9805386f79ba006715030ca75b03e37a392f19d6637
i686 procps-ng-3.3.15-14.el8.i686.rpm 4e8737ad1cebb5a8b2dddefe25db3151feebc1517c97ea01e08c021e3089fd46
i686 procps-ng-devel-3.3.15-14.el8.i686.rpm 7f8b7ef40d4b39f77af1eb1ea4392e9c839d91fac72a7aebb7a6c00009df99ee
noarch procps-ng-i18n-3.3.15-14.el8.noarch.rpm 86a42ad16bd20be8a0135d3bce1dec9fb1eb6218d010abda848aab7e8f22a72e
ppc64le procps-ng-3.3.15-14.el8.ppc64le.rpm 816e217cbd37acfab5ff43ac86c896d091cbd9d75ae838d5fe406ab3854ac772
ppc64le procps-ng-devel-3.3.15-14.el8.ppc64le.rpm e7b2e1c9a624d5bfd24ace387d9c4b246b8c0c9cecc296a7b28c346d5b373a2b
s390x procps-ng-3.3.15-14.el8.s390x.rpm 4cf4bb8d4af376958986f2b71f55c39005d6c3cc3e9ded1d4d1224d6c0c93a6d
s390x procps-ng-devel-3.3.15-14.el8.s390x.rpm 59590dd18070287eeda0c1535e2f71a7baebe1d05a3b1a2faf8c8edd83af3403
x86_64 procps-ng-devel-3.3.15-14.el8.x86_64.rpm 430b74e1422e1fcd487a3d9ac8d3e183bc40b30431bda28b39e979d4ed990c0f
x86_64 procps-ng-3.3.15-14.el8.x86_64.rpm 767a1ebccb2323e9c29e7f513108e00227dd4d9bba4a96589e310d8c2c61dc5b
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.