Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-1124
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:51:48.632Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-3658-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3658-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", }, { name: "DSA-4208", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "GLSA-201805-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201805-14", }, { name: "44806", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/44806/", }, { name: "RHSA-2018:1777", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "RHSA-2018:2267", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { name: "RHSA-2018:2268", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { name: "RHSA-2018:1700", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "1041057", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041057", }, { name: "RHSA-2018:1820", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { name: "USN-3658-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3658-2/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "RHSA-2019:1944", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { name: "RHSA-2019:2401", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { name: "openSUSE-SU-2019:2376", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "procps-ng", vendor: "[UNKNOWN]", versions: [ { status: "affected", version: "procps-ng 3.3.15", }, ], }, ], datePublic: "2018-05-17T00:00:00", descriptions: [ { lang: "en", value: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-190", description: "CWE-190", lang: "en", type: "CWE", }, ], }, { descriptions: [ { cweId: "CWE-122", description: "CWE-122", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-26T23:06:10", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "USN-3658-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3658-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", }, { name: "DSA-4208", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "GLSA-201805-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201805-14", }, { name: "44806", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/44806/", }, { name: "RHSA-2018:1777", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "RHSA-2018:2267", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { name: "RHSA-2018:2268", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { name: "RHSA-2018:1700", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "1041057", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041057", }, { name: "RHSA-2018:1820", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { name: "USN-3658-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3658-2/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "RHSA-2019:1944", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { name: "RHSA-2019:2401", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { name: "openSUSE-SU-2019:2376", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-1124", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "procps-ng", version: { version_data: [ { version_value: "procps-ng 3.3.15", }, ], }, }, ], }, vendor_name: "[UNKNOWN]", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", }, ], }, impact: { cvss: [ [ { vectorString: "7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-190", }, ], }, { description: [ { lang: "eng", value: "CWE-122", }, ], }, ], }, references: { reference_data: [ { name: "USN-3658-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-1/", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", }, { name: "DSA-4208", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "GLSA-201805-14", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201805-14", }, { name: "44806", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/44806/", }, { name: "RHSA-2018:1777", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "RHSA-2018:2267", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { name: "RHSA-2018:2268", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { name: "RHSA-2018:1700", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { name: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", refsource: "CONFIRM", url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { name: "104214", refsource: "BID", url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", refsource: "MLIST", url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "1041057", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041057", }, { name: "RHSA-2018:1820", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { name: "USN-3658-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-2/", }, { name: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", refsource: "MISC", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "RHSA-2019:1944", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { name: "RHSA-2019:2401", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { name: "openSUSE-SU-2019:2376", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2018-1124", datePublished: "2018-05-23T13:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T03:51:48.632Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2018-1124\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-05-23T13:29:00.263\",\"lastModified\":\"2024-11-21T03:59:13.937\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.\"},{\"lang\":\"es\",\"value\":\"procps-ng en versiones anteriores a la 3.3.15 es vulnerable a múltiples desbordamientos de enteros que conducen a una corrupción de la memoria dinámica (heap) en la función file2strvec. Esto permite el escalado de privilegios para un atacante local que puede crear entradas en procfs empezando procesos, lo que podría resultar en cierres inesperados o la ejecución de código arbitrario en las utilidades proc ejecutadas por otros usuarios.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"},{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:procps-ng_project:procps-ng:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.3.15\",\"matchCriteriaId\":\"9D3B02AD-4269-4FF0-9E2B-C336F3E56A7B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB48767-F095-444F-9E05-D9AC345AB803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.6.0\",\"matchCriteriaId\":\"6CB56955-1A47-4F6C-A354-8BBAE7534504\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2018/q2/122\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104214\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041057\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1700\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1777\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1820\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2267\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2268\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1944\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2401\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content&id=SB10241\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201805-14\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3658-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3658-2/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4208\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44806/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2018/q2/122\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104214\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041057\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1700\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1777\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1820\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2267\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2268\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1944\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2401\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content&id=SB10241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201805-14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3658-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3658-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4208\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44806/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}", }, }
rhsa-2018:2268
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps packages contain a set of system utilities that provide system information. The procps packages include the following utilities: ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, pwdx, sysctl, pmap, and slabtop.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2268", url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2268.json", }, ], title: "Red Hat Security Advisory: procps security update", tracking: { current_release_date: "2024-11-15T00:34:39+00:00", generator: { date: "2024-11-15T00:34:39+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2268", initial_release_date: "2018-07-26T13:17:44+00:00", revision_history: [ { date: "2018-07-26T13:17:44+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-26T13:17:44+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:34:39+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Server AUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:6.6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:6.6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server TUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:6.6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:6.6::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", product: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", product_id: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-30.el6_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", product: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", product_id: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-30.el6_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-30.el6_6.1.x86_64", product: { name: "procps-0:3.2.8-30.el6_6.1.x86_64", product_id: "procps-0:3.2.8-30.el6_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-30.el6_6.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-30.el6_6.1.i686", product: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686", product_id: "procps-devel-0:3.2.8-30.el6_6.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-30.el6_6.1?arch=i686", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", product: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", product_id: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-30.el6_6.1?arch=i686", }, }, }, { category: "product_version", name: "procps-0:3.2.8-30.el6_6.1.i686", product: { name: "procps-0:3.2.8-30.el6_6.1.i686", product_id: "procps-0:3.2.8-30.el6_6.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-30.el6_6.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-30.el6_6.1.src", product: { name: "procps-0:3.2.8-30.el6_6.1.src", product_id: "procps-0:3.2.8-30.el6_6.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-30.el6_6.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.TUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T13:17:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2268", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T13:17:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2268", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2018_1777
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps packages contain a set of system utilities that provide system information. The procps packages include the following utilities: ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, pwdx, sysctl, pmap, and slabtop.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:1777", url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1777.json", }, ], title: "Red Hat Security Advisory: procps security update", tracking: { current_release_date: "2024-11-15T00:33:41+00:00", generator: { date: "2024-11-15T00:33:41+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:1777", initial_release_date: "2018-05-31T14:04:52+00:00", revision_history: [ { date: "2018-05-31T14:04:52+00:00", number: "1", summary: "Initial version", }, { date: "2018-05-31T14:04:52+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:33:41+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 6)", product: { name: "Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.x86_64", product: { name: "procps-0:3.2.8-45.el6_9.3.x86_64", product_id: "procps-0:3.2.8-45.el6_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", product_id: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=i686", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.i686", product: { name: "procps-0:3.2.8-45.el6_9.3.i686", product_id: "procps-0:3.2.8-45.el6_9.3.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=i686", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.i686", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686", product_id: "procps-devel-0:3.2.8-45.el6_9.3.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.src", product: { name: "procps-0:3.2.8-45.el6_9.3.src", product_id: "procps-0:3.2.8-45.el6_9.3.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.ppc", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc", product_id: "procps-devel-0:3.2.8-45.el6_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=ppc", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=ppc", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.ppc", product: { name: "procps-0:3.2.8-45.el6_9.3.ppc", product_id: "procps-0:3.2.8-45.el6_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", product_id: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=ppc64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=ppc64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.ppc64", product: { name: "procps-0:3.2.8-45.el6_9.3.ppc64", product_id: "procps-0:3.2.8-45.el6_9.3.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.s390", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390", product_id: "procps-devel-0:3.2.8-45.el6_9.3.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=s390", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=s390", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.s390", product: { name: "procps-0:3.2.8-45.el6_9.3.s390", product_id: "procps-0:3.2.8-45.el6_9.3.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.s390x", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x", product_id: "procps-devel-0:3.2.8-45.el6_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=s390x", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=s390x", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.s390x", product: { name: "procps-0:3.2.8-45.el6_9.3.s390x", product_id: "procps-0:3.2.8-45.el6_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-31T14:04:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-31T14:04:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
RHSA-2019:1944
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps-ng is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1944", url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1944.json", }, ], title: "Red Hat Security Advisory: procps-ng security update", tracking: { current_release_date: "2024-11-15T00:43:36+00:00", generator: { date: "2024-11-15T00:43:36+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1944", initial_release_date: "2019-07-30T09:17:00+00:00", revision_history: [ { date: "2019-07-30T09:17:00+00:00", number: "1", summary: "Initial version", }, { date: "2019-07-30T09:17:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:43:36+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.ppc", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc", product_id: "procps-ng-0:3.3.10-16.el7_4.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.i686", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686", product_id: "procps-ng-0:3.3.10-16.el7_4.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.s390", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390", product_id: "procps-ng-0:3.3.10-16.el7_4.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.src", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.src", product_id: "procps-ng-0:3.3.10-16.el7_4.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-07-30T09:17:00+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1944", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-07-30T09:17:00+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1944", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2018:1820
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for RHEL-7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.\n\nBug Fix(es):\n\n* Previously some SELinux %post scripts were not re-executed because imgbased attempts to re-execute RPM %post scripts which involve SELinux commands inside a namespace, and some commands failed due to SELinux namespacing rules.\n\nThis update ensures that SELinux contexts inside imgbased update namespaces now update appropriately, and the scripts are re-executed by remounting /sys and /sys/fs/selinux inside the update namespace. (BZ#1571607)\n\n* Previously, vmcore files that were created by kdump were not relabelled by kdumpctl after a reboot. As a result, Rsync returned an error when trying to remove the security.selinux attribute while syncing unlabelled files, as this is forbidden by selinux.\n\nIn this release, restorecon is run on the source directory before syncing it, which enables the files to be synchronized with the correct labels. (BZ#1579141)\n\nEnhancement(s):\n\n* Previously, imgbased filtered out stderr from LVM commands to improve parsing reliability. In this release, imgbased now logs stderr from LVM commands in order to provide this information in the imgbased logs, for example during an upgrade failure. (BZ#1574187)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:1820", url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1571607", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1571607", }, { category: "external", summary: "1573334", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1573334", }, { category: "external", summary: "1574187", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1574187", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "1575922", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575922", }, { category: "external", summary: "1579141", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1579141", }, { category: "external", summary: "1582433", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1582433", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1820.json", }, ], title: "Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-15T00:33:46+00:00", generator: { date: "2024-11-15T00:33:46+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:1820", initial_release_date: "2018-06-11T06:57:24+00:00", revision_history: [ { date: "2018-06-11T06:57:24+00:00", number: "1", summary: "Initial version", }, { date: "2018-06-11T06:57:24+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:33:46+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product: { name: "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::hypervisor", }, }, }, { category: "product_name", name: "Red Hat Virtualization 4 Hypervisor for RHEL 7", product: { name: "Red Hat Virtualization 4 Hypervisor for RHEL 7", product_id: "7Server-RHEV-4-Hypervisor-7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::hypervisor", }, }, }, ], category: "product_family", name: "Red Hat Virtualization", }, { branches: [ { category: "product_version", name: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", product: { name: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", product_id: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/python-imgbased@1.0.17-0.1.el7ev?arch=noarch", }, }, }, { category: "product_version", name: "imgbased-0:1.0.17-0.1.el7ev.noarch", product: { name: "imgbased-0:1.0.17-0.1.el7ev.noarch", product_id: "imgbased-0:1.0.17-0.1.el7ev.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/imgbased@1.0.17-0.1.el7ev?arch=noarch", }, }, }, { category: "product_version", name: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", product: { name: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", product_id: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-3.1.el7?arch=noarch", }, }, }, { category: "product_version", name: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", product: { name: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", product_id: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20180531.0.el7_5?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "imgbased-0:1.0.17-0.1.el7ev.src", product: { name: "imgbased-0:1.0.17-0.1.el7ev.src", product_id: "imgbased-0:1.0.17-0.1.el7ev.src", product_identification_helper: { purl: "pkg:rpm/redhat/imgbased@1.0.17-0.1.el7ev?arch=src", }, }, }, { category: "product_version", name: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", product: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", product_id: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.1.el7?arch=src", }, }, }, { category: "product_version", name: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", product: { name: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", product_id: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-virtualization-host@4.2-20180531.0.el7_5?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", product: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", product_id: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.1.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", product_id: "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", }, product_reference: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", relates_to_product_reference: "7Server-RHEV-4-Hypervisor-7", }, { category: "default_component_of", full_product_name: { name: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", product_id: "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", }, product_reference: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", relates_to_product_reference: "7Server-RHEV-4-Hypervisor-7", }, { category: "default_component_of", full_product_name: { name: "imgbased-0:1.0.17-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", }, product_reference: "imgbased-0:1.0.17-0.1.el7ev.noarch", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "imgbased-0:1.0.17-0.1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", }, product_reference: "imgbased-0:1.0.17-0.1.el7ev.src", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "python-imgbased-0:1.0.17-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", }, product_reference: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", }, product_reference: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", }, product_reference: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", }, product_reference: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-06-11T06:57:24+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", product_ids: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1820", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-06-11T06:57:24+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", product_ids: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1820", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
RHSA-2018:1700
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps-ng is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:1700", url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1700.json", }, ], title: "Red Hat Security Advisory: procps-ng security update", tracking: { current_release_date: "2024-11-15T00:33:35+00:00", generator: { date: "2024-11-15T00:33:35+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:1700", initial_release_date: "2018-05-23T15:56:16+00:00", revision_history: [ { date: "2018-05-23T15:56:16+00:00", number: "1", summary: "Initial version", }, { date: "2018-05-23T15:56:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:33:35+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.i686", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686", product_id: "procps-ng-0:3.3.10-17.el7_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.src", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.src", product_id: "procps-ng-0:3.3.10-17.el7_5.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.ppc", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc", product_id: "procps-ng-0:3.3.10-17.el7_5.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.s390", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390", product_id: "procps-ng-0:3.3.10-17.el7_5.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-23T15:56:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1700", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-23T15:56:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1700", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
RHSA-2019:2401
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps-ng is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2401", url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2401.json", }, ], title: "Red Hat Security Advisory: procps-ng security update", tracking: { current_release_date: "2024-11-15T00:44:51+00:00", generator: { date: "2024-11-15T00:44:51+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2401", initial_release_date: "2019-08-07T11:39:40+00:00", revision_history: [ { date: "2019-08-07T11:39:40+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-07T11:39:40+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:44:51+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Server AUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server E4S (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_e4s:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_e4s:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server TUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:7.3::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", product: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", product_id: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-10.el7_3.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", product: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", product_id: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-10.el7_3.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.i686", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686", product_id: "procps-ng-0:3.3.10-10.el7_3.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.src", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.src", product_id: "procps-ng-0:3.3.10-10.el7_3.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T11:39:40+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2401", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, ], }
rhsa-2019:2401
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps-ng is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2401", url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2401.json", }, ], title: "Red Hat Security Advisory: procps-ng security update", tracking: { current_release_date: "2024-11-15T00:44:51+00:00", generator: { date: "2024-11-15T00:44:51+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2401", initial_release_date: "2019-08-07T11:39:40+00:00", revision_history: [ { date: "2019-08-07T11:39:40+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-07T11:39:40+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:44:51+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Server AUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server E4S (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_e4s:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_e4s:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server TUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:7.3::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", product: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", product_id: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-10.el7_3.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", product: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", product_id: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-10.el7_3.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.i686", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686", product_id: "procps-ng-0:3.3.10-10.el7_3.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.src", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.src", product_id: "procps-ng-0:3.3.10-10.el7_3.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T11:39:40+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2401", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, ], }
RHSA-2018:1820
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for RHEL-7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.\n\nBug Fix(es):\n\n* Previously some SELinux %post scripts were not re-executed because imgbased attempts to re-execute RPM %post scripts which involve SELinux commands inside a namespace, and some commands failed due to SELinux namespacing rules.\n\nThis update ensures that SELinux contexts inside imgbased update namespaces now update appropriately, and the scripts are re-executed by remounting /sys and /sys/fs/selinux inside the update namespace. (BZ#1571607)\n\n* Previously, vmcore files that were created by kdump were not relabelled by kdumpctl after a reboot. As a result, Rsync returned an error when trying to remove the security.selinux attribute while syncing unlabelled files, as this is forbidden by selinux.\n\nIn this release, restorecon is run on the source directory before syncing it, which enables the files to be synchronized with the correct labels. (BZ#1579141)\n\nEnhancement(s):\n\n* Previously, imgbased filtered out stderr from LVM commands to improve parsing reliability. In this release, imgbased now logs stderr from LVM commands in order to provide this information in the imgbased logs, for example during an upgrade failure. (BZ#1574187)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:1820", url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1571607", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1571607", }, { category: "external", summary: "1573334", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1573334", }, { category: "external", summary: "1574187", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1574187", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "1575922", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575922", }, { category: "external", summary: "1579141", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1579141", }, { category: "external", summary: "1582433", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1582433", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1820.json", }, ], title: "Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-15T00:33:46+00:00", generator: { date: "2024-11-15T00:33:46+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:1820", initial_release_date: "2018-06-11T06:57:24+00:00", revision_history: [ { date: "2018-06-11T06:57:24+00:00", number: "1", summary: "Initial version", }, { date: "2018-06-11T06:57:24+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:33:46+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product: { name: "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::hypervisor", }, }, }, { category: "product_name", name: "Red Hat Virtualization 4 Hypervisor for RHEL 7", product: { name: "Red Hat Virtualization 4 Hypervisor for RHEL 7", product_id: "7Server-RHEV-4-Hypervisor-7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::hypervisor", }, }, }, ], category: "product_family", name: "Red Hat Virtualization", }, { branches: [ { category: "product_version", name: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", product: { name: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", product_id: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/python-imgbased@1.0.17-0.1.el7ev?arch=noarch", }, }, }, { category: "product_version", name: "imgbased-0:1.0.17-0.1.el7ev.noarch", product: { name: "imgbased-0:1.0.17-0.1.el7ev.noarch", product_id: "imgbased-0:1.0.17-0.1.el7ev.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/imgbased@1.0.17-0.1.el7ev?arch=noarch", }, }, }, { category: "product_version", name: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", product: { name: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", product_id: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-3.1.el7?arch=noarch", }, }, }, { category: "product_version", name: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", product: { name: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", product_id: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20180531.0.el7_5?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "imgbased-0:1.0.17-0.1.el7ev.src", product: { name: "imgbased-0:1.0.17-0.1.el7ev.src", product_id: "imgbased-0:1.0.17-0.1.el7ev.src", product_identification_helper: { purl: "pkg:rpm/redhat/imgbased@1.0.17-0.1.el7ev?arch=src", }, }, }, { category: "product_version", name: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", product: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", product_id: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.1.el7?arch=src", }, }, }, { category: "product_version", name: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", product: { name: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", product_id: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-virtualization-host@4.2-20180531.0.el7_5?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", product: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", product_id: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.1.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", product_id: "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", }, product_reference: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", relates_to_product_reference: "7Server-RHEV-4-Hypervisor-7", }, { category: "default_component_of", full_product_name: { name: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", product_id: "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", }, product_reference: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", relates_to_product_reference: "7Server-RHEV-4-Hypervisor-7", }, { category: "default_component_of", full_product_name: { name: "imgbased-0:1.0.17-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", }, product_reference: "imgbased-0:1.0.17-0.1.el7ev.noarch", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "imgbased-0:1.0.17-0.1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", }, product_reference: "imgbased-0:1.0.17-0.1.el7ev.src", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "python-imgbased-0:1.0.17-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", }, product_reference: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", }, product_reference: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", }, product_reference: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", }, product_reference: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-06-11T06:57:24+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", product_ids: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1820", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-06-11T06:57:24+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", product_ids: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1820", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2018:2267
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps packages contain a set of system utilities that provide system information. The procps packages include the following utilities: ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, pwdx, sysctl, pmap, and slabtop.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2267", url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2267.json", }, ], title: "Red Hat Security Advisory: procps security update", tracking: { current_release_date: "2024-11-15T00:34:44+00:00", generator: { date: "2024-11-15T00:34:44+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2267", initial_release_date: "2018-07-26T12:08:22+00:00", revision_history: [ { date: "2018-07-26T12:08:22+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-26T12:08:22+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:34:44+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.x86_64", product: { name: "procps-0:3.2.8-35.el6_7.1.x86_64", product_id: "procps-0:3.2.8-35.el6_7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", product_id: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.i686", product: { name: "procps-0:3.2.8-35.el6_7.1.i686", product_id: "procps-0:3.2.8-35.el6_7.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=i686", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=i686", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.i686", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686", product_id: "procps-devel-0:3.2.8-35.el6_7.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.src", product: { name: "procps-0:3.2.8-35.el6_7.1.src", product_id: "procps-0:3.2.8-35.el6_7.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.ppc", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc", product_id: "procps-devel-0:3.2.8-35.el6_7.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.ppc", product: { name: "procps-0:3.2.8-35.el6_7.1.ppc", product_id: "procps-0:3.2.8-35.el6_7.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", product_id: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.ppc64", product: { name: "procps-0:3.2.8-35.el6_7.1.ppc64", product_id: "procps-0:3.2.8-35.el6_7.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.s390", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390", product_id: "procps-devel-0:3.2.8-35.el6_7.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=s390", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=s390", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.s390", product: { name: "procps-0:3.2.8-35.el6_7.1.s390", product_id: "procps-0:3.2.8-35.el6_7.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.s390x", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x", product_id: "procps-devel-0:3.2.8-35.el6_7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.s390x", product: { name: "procps-0:3.2.8-35.el6_7.1.s390x", product_id: "procps-0:3.2.8-35.el6_7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T12:08:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2267", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T12:08:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2267", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
RHSA-2018:2267
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps packages contain a set of system utilities that provide system information. The procps packages include the following utilities: ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, pwdx, sysctl, pmap, and slabtop.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2267", url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2267.json", }, ], title: "Red Hat Security Advisory: procps security update", tracking: { current_release_date: "2024-11-15T00:34:44+00:00", generator: { date: "2024-11-15T00:34:44+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2267", initial_release_date: "2018-07-26T12:08:22+00:00", revision_history: [ { date: "2018-07-26T12:08:22+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-26T12:08:22+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:34:44+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.x86_64", product: { name: "procps-0:3.2.8-35.el6_7.1.x86_64", product_id: "procps-0:3.2.8-35.el6_7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", product_id: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.i686", product: { name: "procps-0:3.2.8-35.el6_7.1.i686", product_id: "procps-0:3.2.8-35.el6_7.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=i686", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=i686", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.i686", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686", product_id: "procps-devel-0:3.2.8-35.el6_7.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.src", product: { name: "procps-0:3.2.8-35.el6_7.1.src", product_id: "procps-0:3.2.8-35.el6_7.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.ppc", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc", product_id: "procps-devel-0:3.2.8-35.el6_7.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.ppc", product: { name: "procps-0:3.2.8-35.el6_7.1.ppc", product_id: "procps-0:3.2.8-35.el6_7.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", product_id: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.ppc64", product: { name: "procps-0:3.2.8-35.el6_7.1.ppc64", product_id: "procps-0:3.2.8-35.el6_7.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.s390", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390", product_id: "procps-devel-0:3.2.8-35.el6_7.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=s390", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=s390", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.s390", product: { name: "procps-0:3.2.8-35.el6_7.1.s390", product_id: "procps-0:3.2.8-35.el6_7.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.s390x", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x", product_id: "procps-devel-0:3.2.8-35.el6_7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.s390x", product: { name: "procps-0:3.2.8-35.el6_7.1.s390x", product_id: "procps-0:3.2.8-35.el6_7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T12:08:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2267", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T12:08:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2267", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2019_2401
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps-ng is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2401", url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2401.json", }, ], title: "Red Hat Security Advisory: procps-ng security update", tracking: { current_release_date: "2024-11-15T00:44:51+00:00", generator: { date: "2024-11-15T00:44:51+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2401", initial_release_date: "2019-08-07T11:39:40+00:00", revision_history: [ { date: "2019-08-07T11:39:40+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-07T11:39:40+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:44:51+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Server AUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server E4S (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_e4s:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_e4s:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server TUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:7.3::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", product_id: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", product: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", product_id: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-10.el7_3.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", product: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", product_id: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-10.el7_3.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.i686", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686", product_id: "procps-ng-0:3.3.10-10.el7_3.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.src", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.src", product_id: "procps-ng-0:3.3.10-10.el7_3.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", product: { name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", product_id: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-10.el7_3.1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", product_id: "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", product_id: "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", product_id: "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", product_id: "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)", product_id: "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.E4S", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.src", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.i686", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)", product_id: "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", relates_to_product_reference: "7Server-optional-7.3.TUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-07T11:39:40+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2401", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.AUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.AUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.AUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.E4S:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.ppc64le", "7Server-optional-7.3.E4S:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.src", "7Server-optional-7.3.TUS:procps-ng-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-debuginfo-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.i686", "7Server-optional-7.3.TUS:procps-ng-devel-0:3.3.10-10.el7_3.1.x86_64", "7Server-optional-7.3.TUS:procps-ng-i18n-0:3.3.10-10.el7_3.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, ], }
rhsa-2018:1777
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps packages contain a set of system utilities that provide system information. The procps packages include the following utilities: ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, pwdx, sysctl, pmap, and slabtop.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:1777", url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1777.json", }, ], title: "Red Hat Security Advisory: procps security update", tracking: { current_release_date: "2024-11-15T00:33:41+00:00", generator: { date: "2024-11-15T00:33:41+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:1777", initial_release_date: "2018-05-31T14:04:52+00:00", revision_history: [ { date: "2018-05-31T14:04:52+00:00", number: "1", summary: "Initial version", }, { date: "2018-05-31T14:04:52+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:33:41+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 6)", product: { name: "Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.x86_64", product: { name: "procps-0:3.2.8-45.el6_9.3.x86_64", product_id: "procps-0:3.2.8-45.el6_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", product_id: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=i686", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.i686", product: { name: "procps-0:3.2.8-45.el6_9.3.i686", product_id: "procps-0:3.2.8-45.el6_9.3.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=i686", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.i686", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686", product_id: "procps-devel-0:3.2.8-45.el6_9.3.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.src", product: { name: "procps-0:3.2.8-45.el6_9.3.src", product_id: "procps-0:3.2.8-45.el6_9.3.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.ppc", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc", product_id: "procps-devel-0:3.2.8-45.el6_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=ppc", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=ppc", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.ppc", product: { name: "procps-0:3.2.8-45.el6_9.3.ppc", product_id: "procps-0:3.2.8-45.el6_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", product_id: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=ppc64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=ppc64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.ppc64", product: { name: "procps-0:3.2.8-45.el6_9.3.ppc64", product_id: "procps-0:3.2.8-45.el6_9.3.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.s390", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390", product_id: "procps-devel-0:3.2.8-45.el6_9.3.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=s390", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=s390", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.s390", product: { name: "procps-0:3.2.8-45.el6_9.3.s390", product_id: "procps-0:3.2.8-45.el6_9.3.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.s390x", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x", product_id: "procps-devel-0:3.2.8-45.el6_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=s390x", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=s390x", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.s390x", product: { name: "procps-0:3.2.8-45.el6_9.3.s390x", product_id: "procps-0:3.2.8-45.el6_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-31T14:04:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-31T14:04:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2018_1700
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps-ng is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:1700", url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1700.json", }, ], title: "Red Hat Security Advisory: procps-ng security update", tracking: { current_release_date: "2024-11-15T00:33:35+00:00", generator: { date: "2024-11-15T00:33:35+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:1700", initial_release_date: "2018-05-23T15:56:16+00:00", revision_history: [ { date: "2018-05-23T15:56:16+00:00", number: "1", summary: "Initial version", }, { date: "2018-05-23T15:56:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:33:35+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.i686", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686", product_id: "procps-ng-0:3.3.10-17.el7_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.src", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.src", product_id: "procps-ng-0:3.3.10-17.el7_5.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.ppc", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc", product_id: "procps-ng-0:3.3.10-17.el7_5.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.s390", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390", product_id: "procps-ng-0:3.3.10-17.el7_5.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-23T15:56:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1700", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-23T15:56:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1700", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2018_2267
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps packages contain a set of system utilities that provide system information. The procps packages include the following utilities: ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, pwdx, sysctl, pmap, and slabtop.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2267", url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2267.json", }, ], title: "Red Hat Security Advisory: procps security update", tracking: { current_release_date: "2024-11-15T00:34:44+00:00", generator: { date: "2024-11-15T00:34:44+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2267", initial_release_date: "2018-07-26T12:08:22+00:00", revision_history: [ { date: "2018-07-26T12:08:22+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-26T12:08:22+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:34:44+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.7::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.x86_64", product: { name: "procps-0:3.2.8-35.el6_7.1.x86_64", product_id: "procps-0:3.2.8-35.el6_7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", product_id: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.i686", product: { name: "procps-0:3.2.8-35.el6_7.1.i686", product_id: "procps-0:3.2.8-35.el6_7.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=i686", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=i686", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.i686", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686", product_id: "procps-devel-0:3.2.8-35.el6_7.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.src", product: { name: "procps-0:3.2.8-35.el6_7.1.src", product_id: "procps-0:3.2.8-35.el6_7.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.ppc", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc", product_id: "procps-devel-0:3.2.8-35.el6_7.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.ppc", product: { name: "procps-0:3.2.8-35.el6_7.1.ppc", product_id: "procps-0:3.2.8-35.el6_7.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", product_id: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.ppc64", product: { name: "procps-0:3.2.8-35.el6_7.1.ppc64", product_id: "procps-0:3.2.8-35.el6_7.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.s390", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390", product_id: "procps-devel-0:3.2.8-35.el6_7.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=s390", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=s390", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.s390", product: { name: "procps-0:3.2.8-35.el6_7.1.s390", product_id: "procps-0:3.2.8-35.el6_7.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-35.el6_7.1.s390x", product: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x", product_id: "procps-devel-0:3.2.8-35.el6_7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-35.el6_7.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", product: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", product_id: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-35.el6_7.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-0:3.2.8-35.el6_7.1.s390x", product: { name: "procps-0:3.2.8-35.el6_7.1.s390x", product_id: "procps-0:3.2.8-35.el6_7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-35.el6_7.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", product_id: "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", product_id: "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", product_id: "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", }, product_reference: "procps-0:3.2.8-35.el6_7.1.src", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.i686", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.ppc64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.s390x", relates_to_product_reference: "6Server-optional-6.7.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-35.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", product_id: "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-35.el6_7.1.x86_64", relates_to_product_reference: "6Server-optional-6.7.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T12:08:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2267", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T12:08:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2267", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.src", "6Server-optional-6.7.EUS:procps-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-debuginfo-0:3.2.8-35.el6_7.1.x86_64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.i686", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.ppc64", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.s390x", "6Server-optional-6.7.EUS:procps-devel-0:3.2.8-35.el6_7.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2018_2268
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps packages contain a set of system utilities that provide system information. The procps packages include the following utilities: ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, pwdx, sysctl, pmap, and slabtop.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2268", url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2268.json", }, ], title: "Red Hat Security Advisory: procps security update", tracking: { current_release_date: "2024-11-15T00:34:39+00:00", generator: { date: "2024-11-15T00:34:39+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2268", initial_release_date: "2018-07-26T13:17:44+00:00", revision_history: [ { date: "2018-07-26T13:17:44+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-26T13:17:44+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:34:39+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Server AUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:6.6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:6.6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server TUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:6.6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:6.6::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", product: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", product_id: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-30.el6_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", product: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", product_id: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-30.el6_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-30.el6_6.1.x86_64", product: { name: "procps-0:3.2.8-30.el6_6.1.x86_64", product_id: "procps-0:3.2.8-30.el6_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-30.el6_6.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-30.el6_6.1.i686", product: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686", product_id: "procps-devel-0:3.2.8-30.el6_6.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-30.el6_6.1?arch=i686", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", product: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", product_id: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-30.el6_6.1?arch=i686", }, }, }, { category: "product_version", name: "procps-0:3.2.8-30.el6_6.1.i686", product: { name: "procps-0:3.2.8-30.el6_6.1.i686", product_id: "procps-0:3.2.8-30.el6_6.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-30.el6_6.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-30.el6_6.1.src", product: { name: "procps-0:3.2.8-30.el6_6.1.src", product_id: "procps-0:3.2.8-30.el6_6.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-30.el6_6.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.TUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T13:17:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2268", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T13:17:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2268", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2019:1944
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps-ng is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1944", url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1944.json", }, ], title: "Red Hat Security Advisory: procps-ng security update", tracking: { current_release_date: "2024-11-15T00:43:36+00:00", generator: { date: "2024-11-15T00:43:36+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1944", initial_release_date: "2019-07-30T09:17:00+00:00", revision_history: [ { date: "2019-07-30T09:17:00+00:00", number: "1", summary: "Initial version", }, { date: "2019-07-30T09:17:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:43:36+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.ppc", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc", product_id: "procps-ng-0:3.3.10-16.el7_4.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.i686", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686", product_id: "procps-ng-0:3.3.10-16.el7_4.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.s390", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390", product_id: "procps-ng-0:3.3.10-16.el7_4.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.src", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.src", product_id: "procps-ng-0:3.3.10-16.el7_4.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-07-30T09:17:00+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1944", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-07-30T09:17:00+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1944", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
RHSA-2018:2268
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps packages contain a set of system utilities that provide system information. The procps packages include the following utilities: ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, pwdx, sysctl, pmap, and slabtop.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:2268", url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2268.json", }, ], title: "Red Hat Security Advisory: procps security update", tracking: { current_release_date: "2024-11-15T00:34:39+00:00", generator: { date: "2024-11-15T00:34:39+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:2268", initial_release_date: "2018-07-26T13:17:44+00:00", revision_history: [ { date: "2018-07-26T13:17:44+00:00", number: "1", summary: "Initial version", }, { date: "2018-07-26T13:17:44+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:34:39+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Server AUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:6.6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_aus:6.6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server TUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:6.6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product: { name: "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_tus:6.6::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", product: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", product_id: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-30.el6_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", product: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", product_id: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-30.el6_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-30.el6_6.1.x86_64", product: { name: "procps-0:3.2.8-30.el6_6.1.x86_64", product_id: "procps-0:3.2.8-30.el6_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-30.el6_6.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-30.el6_6.1.i686", product: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686", product_id: "procps-devel-0:3.2.8-30.el6_6.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-30.el6_6.1?arch=i686", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", product: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", product_id: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-30.el6_6.1?arch=i686", }, }, }, { category: "product_version", name: "procps-0:3.2.8-30.el6_6.1.i686", product: { name: "procps-0:3.2.8-30.el6_6.1.i686", product_id: "procps-0:3.2.8-30.el6_6.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-30.el6_6.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-30.el6_6.1.src", product: { name: "procps-0:3.2.8-30.el6_6.1.src", product_id: "procps-0:3.2.8-30.el6_6.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-30.el6_6.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", product_id: "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", product_id: "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", product_id: "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.AUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", }, product_reference: "procps-0:3.2.8-30.el6_6.1.src", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.i686", relates_to_product_reference: "6Server-optional-6.6.TUS", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-30.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", product_id: "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", }, product_reference: "procps-devel-0:3.2.8-30.el6_6.1.x86_64", relates_to_product_reference: "6Server-optional-6.6.TUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T13:17:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2268", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-07-26T13:17:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:2268", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.AUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.AUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.src", "6Server-optional-6.6.TUS:procps-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-debuginfo-0:3.2.8-30.el6_6.1.x86_64", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.i686", "6Server-optional-6.6.TUS:procps-devel-0:3.2.8-30.el6_6.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
RHSA-2018:1777
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps packages contain a set of system utilities that provide system information. The procps packages include the following utilities: ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, pwdx, sysctl, pmap, and slabtop.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:1777", url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1777.json", }, ], title: "Red Hat Security Advisory: procps security update", tracking: { current_release_date: "2024-11-15T00:33:41+00:00", generator: { date: "2024-11-15T00:33:41+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:1777", initial_release_date: "2018-05-31T14:04:52+00:00", revision_history: [ { date: "2018-05-31T14:04:52+00:00", number: "1", summary: "Initial version", }, { date: "2018-05-31T14:04:52+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:33:41+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 6)", product: { name: "Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.x86_64", product: { name: "procps-0:3.2.8-45.el6_9.3.x86_64", product_id: "procps-0:3.2.8-45.el6_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", product_id: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=i686", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.i686", product: { name: "procps-0:3.2.8-45.el6_9.3.i686", product_id: "procps-0:3.2.8-45.el6_9.3.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=i686", }, }, }, { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.i686", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686", product_id: "procps-devel-0:3.2.8-45.el6_9.3.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.src", product: { name: "procps-0:3.2.8-45.el6_9.3.src", product_id: "procps-0:3.2.8-45.el6_9.3.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.ppc", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc", product_id: "procps-devel-0:3.2.8-45.el6_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=ppc", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=ppc", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.ppc", product: { name: "procps-0:3.2.8-45.el6_9.3.ppc", product_id: "procps-0:3.2.8-45.el6_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", product_id: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=ppc64", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=ppc64", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.ppc64", product: { name: "procps-0:3.2.8-45.el6_9.3.ppc64", product_id: "procps-0:3.2.8-45.el6_9.3.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.s390", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390", product_id: "procps-devel-0:3.2.8-45.el6_9.3.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=s390", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=s390", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.s390", product: { name: "procps-0:3.2.8-45.el6_9.3.s390", product_id: "procps-0:3.2.8-45.el6_9.3.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-devel-0:3.2.8-45.el6_9.3.s390x", product: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x", product_id: "procps-devel-0:3.2.8-45.el6_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-devel@3.2.8-45.el6_9.3?arch=s390x", }, }, }, { category: "product_version", name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", product: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", product_id: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-debuginfo@3.2.8-45.el6_9.3?arch=s390x", }, }, }, { category: "product_version", name: "procps-0:3.2.8-45.el6_9.3.s390x", product: { name: "procps-0:3.2.8-45.el6_9.3.s390x", product_id: "procps-0:3.2.8-45.el6_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps@3.2.8-45.el6_9.3?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Client-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Server-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", }, product_reference: "procps-0:3.2.8-45.el6_9.3.src", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.i686", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.ppc64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.s390x", relates_to_product_reference: "6Workstation-optional-6.9.z", }, { category: "default_component_of", full_product_name: { name: "procps-devel-0:3.2.8-45.el6_9.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", }, product_reference: "procps-devel-0:3.2.8-45.el6_9.3.x86_64", relates_to_product_reference: "6Workstation-optional-6.9.z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-31T14:04:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-31T14:04:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Client-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Client-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6ComputeNode-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6ComputeNode-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Server-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Server-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.src", "6Workstation-optional-6.9.z:procps-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-debuginfo-0:3.2.8-45.el6_9.3.x86_64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.i686", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.ppc64", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.s390x", "6Workstation-optional-6.9.z:procps-devel-0:3.2.8-45.el6_9.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2018_1820
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for RHEL-7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.\n\nBug Fix(es):\n\n* Previously some SELinux %post scripts were not re-executed because imgbased attempts to re-execute RPM %post scripts which involve SELinux commands inside a namespace, and some commands failed due to SELinux namespacing rules.\n\nThis update ensures that SELinux contexts inside imgbased update namespaces now update appropriately, and the scripts are re-executed by remounting /sys and /sys/fs/selinux inside the update namespace. (BZ#1571607)\n\n* Previously, vmcore files that were created by kdump were not relabelled by kdumpctl after a reboot. As a result, Rsync returned an error when trying to remove the security.selinux attribute while syncing unlabelled files, as this is forbidden by selinux.\n\nIn this release, restorecon is run on the source directory before syncing it, which enables the files to be synchronized with the correct labels. (BZ#1579141)\n\nEnhancement(s):\n\n* Previously, imgbased filtered out stderr from LVM commands to improve parsing reliability. In this release, imgbased now logs stderr from LVM commands in order to provide this information in the imgbased logs, for example during an upgrade failure. (BZ#1574187)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:1820", url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1571607", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1571607", }, { category: "external", summary: "1573334", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1573334", }, { category: "external", summary: "1574187", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1574187", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "1575922", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575922", }, { category: "external", summary: "1579141", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1579141", }, { category: "external", summary: "1582433", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1582433", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1820.json", }, ], title: "Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-15T00:33:46+00:00", generator: { date: "2024-11-15T00:33:46+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:1820", initial_release_date: "2018-06-11T06:57:24+00:00", revision_history: [ { date: "2018-06-11T06:57:24+00:00", number: "1", summary: "Initial version", }, { date: "2018-06-11T06:57:24+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:33:46+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product: { name: "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::hypervisor", }, }, }, { category: "product_name", name: "Red Hat Virtualization 4 Hypervisor for RHEL 7", product: { name: "Red Hat Virtualization 4 Hypervisor for RHEL 7", product_id: "7Server-RHEV-4-Hypervisor-7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::hypervisor", }, }, }, ], category: "product_family", name: "Red Hat Virtualization", }, { branches: [ { category: "product_version", name: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", product: { name: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", product_id: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/python-imgbased@1.0.17-0.1.el7ev?arch=noarch", }, }, }, { category: "product_version", name: "imgbased-0:1.0.17-0.1.el7ev.noarch", product: { name: "imgbased-0:1.0.17-0.1.el7ev.noarch", product_id: "imgbased-0:1.0.17-0.1.el7ev.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/imgbased@1.0.17-0.1.el7ev?arch=noarch", }, }, }, { category: "product_version", name: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", product: { name: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", product_id: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-3.1.el7?arch=noarch", }, }, }, { category: "product_version", name: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", product: { name: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", product_id: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20180531.0.el7_5?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "imgbased-0:1.0.17-0.1.el7ev.src", product: { name: "imgbased-0:1.0.17-0.1.el7ev.src", product_id: "imgbased-0:1.0.17-0.1.el7ev.src", product_identification_helper: { purl: "pkg:rpm/redhat/imgbased@1.0.17-0.1.el7ev?arch=src", }, }, }, { category: "product_version", name: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", product: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", product_id: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.1.el7?arch=src", }, }, }, { category: "product_version", name: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", product: { name: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", product_id: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-virtualization-host@4.2-20180531.0.el7_5?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", product: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", product_id: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.1.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", product_id: "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", }, product_reference: "redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", relates_to_product_reference: "7Server-RHEV-4-Hypervisor-7", }, { category: "default_component_of", full_product_name: { name: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", product_id: "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", }, product_reference: "redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", relates_to_product_reference: "7Server-RHEV-4-Hypervisor-7", }, { category: "default_component_of", full_product_name: { name: "imgbased-0:1.0.17-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", }, product_reference: "imgbased-0:1.0.17-0.1.el7ev.noarch", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "imgbased-0:1.0.17-0.1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", }, product_reference: "imgbased-0:1.0.17-0.1.el7ev.src", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "python-imgbased-0:1.0.17-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", }, product_reference: "python-imgbased-0:1.0.17-0.1.el7ev.noarch", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", }, product_reference: "redhat-release-virtualization-host-0:4.2-3.1.el7.src", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", }, product_reference: "redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, { category: "default_component_of", full_product_name: { name: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", product_id: "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", }, product_reference: "redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", relates_to_product_reference: "7Server-RHEV-4-HypervisorBuild-7", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-06-11T06:57:24+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", product_ids: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1820", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-06-11T06:57:24+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", product_ids: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1820", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180531.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180531.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.17-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.17-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.1.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.1.el7.noarch", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2018:1700
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps-ng is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:1700", url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1700.json", }, ], title: "Red Hat Security Advisory: procps-ng security update", tracking: { current_release_date: "2024-11-15T00:33:35+00:00", generator: { date: "2024-11-15T00:33:35+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:1700", initial_release_date: "2018-05-23T15:56:16+00:00", revision_history: [ { date: "2018-05-23T15:56:16+00:00", number: "1", summary: "Initial version", }, { date: "2018-05-23T15:56:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:33:35+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.i686", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686", product_id: "procps-ng-0:3.3.10-17.el7_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.src", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.src", product_id: "procps-ng-0:3.3.10-17.el7_5.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.ppc", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc", product_id: "procps-ng-0:3.3.10-17.el7_5.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.s390", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390", product_id: "procps-ng-0:3.3.10-17.el7_5.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", product: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", product_id: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-17.el7_5.2?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Client-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Server-optional-Alt-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.src", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.i686", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.5.Z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-23T15:56:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1700", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-05-23T15:56:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:1700", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Client-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Client-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7ComputeNode-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7ComputeNode-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Server-optional-Alt-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Server-optional-Alt-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.src", "7Workstation-optional-7.5.Z:procps-ng-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-debuginfo-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.i686", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-devel-0:3.3.10-17.el7_5.2.x86_64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.aarch64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.ppc64le", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.s390x", "7Workstation-optional-7.5.Z:procps-ng-i18n-0:3.3.10-17.el7_5.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
rhsa-2019_1944
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for procps-ng is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.\n\nSecurity Fix(es):\n\n* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124)\n\n* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1944", url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1944.json", }, ], title: "Red Hat Security Advisory: procps-ng security update", tracking: { current_release_date: "2024-11-15T00:43:36+00:00", generator: { date: "2024-11-15T00:43:36+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1944", initial_release_date: "2019-07-30T09:17:00+00:00", revision_history: [ { date: "2019-07-30T09:17:00+00:00", number: "1", summary: "Initial version", }, { date: "2019-07-30T09:17:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T00:43:36+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.4::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.ppc", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc", product_id: "procps-ng-0:3.3.10-16.el7_4.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=ppc", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.i686", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686", product_id: "procps-ng-0:3.3.10-16.el7_4.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=i686", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.s390", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390", product_id: "procps-ng-0:3.3.10-16.el7_4.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=s390", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-debuginfo@3.3.10-16.el7_4.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-devel@3.3.10-16.el7_4.1?arch=s390x", }, }, }, { category: "product_version", name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", product: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", product_id: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng-i18n@3.3.10-16.el7_4.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "procps-ng-0:3.3.10-16.el7_4.1.src", product: { name: "procps-ng-0:3.3.10-16.el7_4.1.src", product_id: "procps-ng-0:3.3.10-16.el7_4.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/procps-ng@3.3.10-16.el7_4.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", product_id: "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", product_id: "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.src", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.i686", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", relates_to_product_reference: "7Server-optional-7.4.EUS", }, { category: "default_component_of", full_product_name: { name: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", product_id: "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", }, product_reference: "procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", relates_to_product_reference: "7Server-optional-7.4.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1124", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575465", }, ], notes: [ { category: "description", text: "Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).", title: "Vulnerability description", }, { category: "summary", text: "procps: Integer overflows leading to heap overflow in file2strvec", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "RHBZ#1575465", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1124", url: "https://www.cve.org/CVERecord?id=CVE-2018-1124", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-07-30T09:17:00+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1944", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "procps: Integer overflows leading to heap overflow in file2strvec", }, { acknowledgments: [ { names: [ "Qualys Research Labs", ], }, ], cve: "CVE-2018-1126", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2018-05-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1575853", }, ], notes: [ { category: "description", text: "A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.", title: "Vulnerability description", }, { category: "summary", text: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "RHBZ#1575853", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1126", url: "https://www.cve.org/CVERecord?id=CVE-2018-1126", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1126", }, { category: "external", summary: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], release_date: "2018-05-17T17:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-07-30T09:17:00+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1944", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7ComputeNode-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7ComputeNode-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.src", "7Server-optional-7.4.EUS:procps-ng-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-debuginfo-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.i686", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-devel-0:3.3.10-16.el7_4.1.x86_64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.ppc64le", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.s390x", "7Server-optional-7.4.EUS:procps-ng-i18n-0:3.3.10-16.el7_4.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues", }, ], }
opensuse-su-2024:11195-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "libprocps8-3.3.17-5.2 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the libprocps8-3.3.17-5.2 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11195", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11195-1.json", }, { category: "self", summary: "SUSE CVE CVE-2018-1122 page", url: "https://www.suse.com/security/cve/CVE-2018-1122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1123 page", url: "https://www.suse.com/security/cve/CVE-2018-1123/", }, { category: "self", summary: "SUSE CVE CVE-2018-1124 page", url: "https://www.suse.com/security/cve/CVE-2018-1124/", }, { category: "self", summary: "SUSE CVE CVE-2018-1125 page", url: "https://www.suse.com/security/cve/CVE-2018-1125/", }, { category: "self", summary: "SUSE CVE CVE-2018-1126 page", url: "https://www.suse.com/security/cve/CVE-2018-1126/", }, ], title: "libprocps8-3.3.17-5.2 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11195-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libprocps8-3.3.17-5.2.aarch64", product: { name: "libprocps8-3.3.17-5.2.aarch64", product_id: "libprocps8-3.3.17-5.2.aarch64", }, }, { category: "product_version", name: "procps-3.3.17-5.2.aarch64", product: { name: "procps-3.3.17-5.2.aarch64", product_id: "procps-3.3.17-5.2.aarch64", }, }, { category: "product_version", name: "procps-devel-3.3.17-5.2.aarch64", product: { name: "procps-devel-3.3.17-5.2.aarch64", product_id: "procps-devel-3.3.17-5.2.aarch64", }, }, { category: "product_version", name: "procps-lang-3.3.17-5.2.aarch64", product: { name: "procps-lang-3.3.17-5.2.aarch64", product_id: "procps-lang-3.3.17-5.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libprocps8-3.3.17-5.2.ppc64le", product: { name: "libprocps8-3.3.17-5.2.ppc64le", product_id: "libprocps8-3.3.17-5.2.ppc64le", }, }, { category: "product_version", name: "procps-3.3.17-5.2.ppc64le", product: { name: "procps-3.3.17-5.2.ppc64le", product_id: "procps-3.3.17-5.2.ppc64le", }, }, { category: "product_version", name: "procps-devel-3.3.17-5.2.ppc64le", product: { name: "procps-devel-3.3.17-5.2.ppc64le", product_id: "procps-devel-3.3.17-5.2.ppc64le", }, }, { category: "product_version", name: "procps-lang-3.3.17-5.2.ppc64le", product: { name: "procps-lang-3.3.17-5.2.ppc64le", product_id: "procps-lang-3.3.17-5.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libprocps8-3.3.17-5.2.s390x", product: { name: "libprocps8-3.3.17-5.2.s390x", product_id: "libprocps8-3.3.17-5.2.s390x", }, }, { category: "product_version", name: "procps-3.3.17-5.2.s390x", product: { name: "procps-3.3.17-5.2.s390x", product_id: "procps-3.3.17-5.2.s390x", }, }, { category: "product_version", name: "procps-devel-3.3.17-5.2.s390x", product: { name: "procps-devel-3.3.17-5.2.s390x", product_id: "procps-devel-3.3.17-5.2.s390x", }, }, { category: "product_version", name: "procps-lang-3.3.17-5.2.s390x", product: { name: "procps-lang-3.3.17-5.2.s390x", product_id: "procps-lang-3.3.17-5.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libprocps8-3.3.17-5.2.x86_64", product: { name: "libprocps8-3.3.17-5.2.x86_64", product_id: "libprocps8-3.3.17-5.2.x86_64", }, }, { category: "product_version", name: "procps-3.3.17-5.2.x86_64", product: { name: "procps-3.3.17-5.2.x86_64", product_id: "procps-3.3.17-5.2.x86_64", }, }, { category: "product_version", name: "procps-devel-3.3.17-5.2.x86_64", product: { name: "procps-devel-3.3.17-5.2.x86_64", product_id: "procps-devel-3.3.17-5.2.x86_64", }, }, { category: "product_version", name: "procps-lang-3.3.17-5.2.x86_64", product: { name: "procps-lang-3.3.17-5.2.x86_64", product_id: "procps-lang-3.3.17-5.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libprocps8-3.3.17-5.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", }, product_reference: "libprocps8-3.3.17-5.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libprocps8-3.3.17-5.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", }, product_reference: "libprocps8-3.3.17-5.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libprocps8-3.3.17-5.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", }, product_reference: "libprocps8-3.3.17-5.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libprocps8-3.3.17-5.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", }, product_reference: "libprocps8-3.3.17-5.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.17-5.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", }, product_reference: "procps-3.3.17-5.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.17-5.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", }, product_reference: "procps-3.3.17-5.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.17-5.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", }, product_reference: "procps-3.3.17-5.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.17-5.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", }, product_reference: "procps-3.3.17-5.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.17-5.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", }, product_reference: "procps-devel-3.3.17-5.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.17-5.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", }, product_reference: "procps-devel-3.3.17-5.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.17-5.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", }, product_reference: "procps-devel-3.3.17-5.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.17-5.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", }, product_reference: "procps-devel-3.3.17-5.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-lang-3.3.17-5.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", }, product_reference: "procps-lang-3.3.17-5.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-lang-3.3.17-5.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", }, product_reference: "procps-lang-3.3.17-5.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-lang-3.3.17-5.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", }, product_reference: "procps-lang-3.3.17-5.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps-lang-3.3.17-5.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", }, product_reference: "procps-lang-3.3.17-5.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1122", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1122", url: "https://www.suse.com/security/cve/CVE-2018-1122", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1122", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1122", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1122", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1122", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1122", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1122", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1122", }, { cve: "CVE-2018-1123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1123", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1123", url: "https://www.suse.com/security/cve/CVE-2018-1123", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1123", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1123", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1123", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1123", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1123", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1123", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1123", }, { cve: "CVE-2018-1124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1124", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1124", url: "https://www.suse.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1124", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1124", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1124", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1124", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1124", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1124", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1124", }, { cve: "CVE-2018-1125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1125", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1125", url: "https://www.suse.com/security/cve/CVE-2018-1125", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1125", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1125", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1125", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1125", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1125", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1125", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1125", }, { cve: "CVE-2018-1126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1126", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1126", url: "https://www.suse.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1126", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1126", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1126", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1126", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1126", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1126", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.s390x", "openSUSE Tumbleweed:libprocps8-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-devel-3.3.17-5.2.x86_64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.aarch64", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.ppc64le", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.s390x", "openSUSE Tumbleweed:procps-lang-3.3.17-5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1126", }, ], }
opensuse-su-2019:2376-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for procps", title: "Title of the patch", }, { category: "description", text: "This update for procps fixes the following issues:\n\nprocps was updated to 3.3.15. (bsc#1092100)\n\nFollowing security issues were fixed:\n\n- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top\n with HOME unset in an attacker-controlled directory, the attacker could have\n achieved privilege escalation by exploiting one of several vulnerabilities in\n the config_file() function (bsc#1092100).\n- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.\n Inbuilt protection in ps maped a guard page at the end of the overflowed\n buffer, ensuring that the impact of this flaw is limited to a crash (temporary\n denial of service) (bsc#1092100).\n- CVE-2018-1124: Prevent multiple integer overflows leading to a heap\n corruption in file2strvec function. This allowed a privilege escalation for a\n local attacker who can create entries in procfs by starting processes, which\n could result in crashes or arbitrary code execution in proc utilities run by\n other users (bsc#1092100).\n- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was\n mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).\n- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent\n truncation/integer overflow issues (bsc#1092100).\n\n\nAlso this non-security issue was fixed:\n\n- Fix CPU summary showing old data. (bsc#1121753)\n\nThe update to 3.3.15 contains the following fixes:\n\n* library: Increment to 8:0:1\n No removals, no new functions\n Changes: slab and pid structures\n* library: Just check for SIGLOST and don't delete it\n* library: Fix integer overflow and LPE in file2strvec CVE-2018-1124\n* library: Use size_t for alloc functions CVE-2018-1126\n* library: Increase comm size to 64\n* pgrep: Fix stack-based buffer overflow CVE-2018-1125\n* pgrep: Remove >15 warning as comm can be longer\n* ps: Fix buffer overflow in output buffer, causing DOS CVE-2018-1123\n* ps: Increase command name selection field to 64\n* top: Don't use cwd for location of config CVE-2018-1122\n* update translations\n* library: build on non-glibc systems\n* free: fix scaling on 32-bit systems\n* Revert 'Support running with child namespaces'\n* library: Increment to 7:0:1\n No changes, no removals\n New fuctions: numa_init, numa_max_node, numa_node_of_cpu, numa_uninit, xalloc_err_handler\n* doc: Document I idle state in ps.1 and top.1\n* free: fix some of the SI multiples\n* kill: -l space between name parses correctly\n* library: dont use vm_min_free on non Linux\n* library: don't strip off wchan prefixes (ps & top)\n* pgrep: warn about 15+ char name only if -f not used\n* pgrep/pkill: only match in same namespace by default\n* pidof: specify separator between pids\n* pkill: Return 0 only if we can kill process\n* pmap: fix duplicate output line under '-x' option\n* ps: avoid eip/esp address truncations\n* ps: recognizes SCHED_DEADLINE as valid CPU scheduler\n* ps: display NUMA node under which a thread ran\n* ps: Add seconds display for cputime and time\n* ps: Add LUID field\n* sysctl: Permit empty string for value\n* sysctl: Don't segv when file not available\n* sysctl: Read and write large buffers\n* top: add config file support for XDG specification\n* top: eliminated minor libnuma memory leak\n* top: show fewer memory decimal places (configurable)\n* top: provide command line switch for memory scaling\n* top: provide command line switch for CPU States\n* top: provides more accurate cpu usage at startup\n* top: display NUMA node under which a thread ran\n* top: fix argument parsing quirk resulting in SEGV\n* top: delay interval accepts non-locale radix point\n* top: address a wishlist man page NLS suggestion\n* top: fix potential distortion in 'Mem' graph display\n* top: provide proper multi-byte string handling\n* top: startup defaults are fully customizable\n* watch: define HOST_NAME_MAX where not defined\n* vmstat: Fix alignment for disk partition format\n* watch: Support ANSI 39,49 reset sequences\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-2376", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2376-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:2376-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB/#4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:2376-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB/#4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB", }, { category: "self", summary: "SUSE Bug 1092100", url: "https://bugzilla.suse.com/1092100", }, { category: "self", summary: "SUSE Bug 1121753", url: "https://bugzilla.suse.com/1121753", }, { category: "self", summary: "SUSE CVE CVE-2018-1122 page", url: "https://www.suse.com/security/cve/CVE-2018-1122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1123 page", url: "https://www.suse.com/security/cve/CVE-2018-1123/", }, { category: "self", summary: "SUSE CVE CVE-2018-1124 page", url: "https://www.suse.com/security/cve/CVE-2018-1124/", }, { category: "self", summary: "SUSE CVE CVE-2018-1125 page", url: "https://www.suse.com/security/cve/CVE-2018-1125/", }, { category: "self", summary: "SUSE CVE CVE-2018-1126 page", url: "https://www.suse.com/security/cve/CVE-2018-1126/", }, ], title: "Security update for procps", tracking: { current_release_date: "2019-10-26T14:24:29Z", generator: { date: "2019-10-26T14:24:29Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:2376-1", initial_release_date: "2019-10-26T14:24:29Z", revision_history: [ { date: "2019-10-26T14:24:29Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libprocps7-3.3.15-lp151.6.3.1.i586", product: { name: "libprocps7-3.3.15-lp151.6.3.1.i586", product_id: "libprocps7-3.3.15-lp151.6.3.1.i586", }, }, { category: "product_version", name: "procps-3.3.15-lp151.6.3.1.i586", product: { name: "procps-3.3.15-lp151.6.3.1.i586", product_id: "procps-3.3.15-lp151.6.3.1.i586", }, }, { category: "product_version", name: "procps-devel-3.3.15-lp151.6.3.1.i586", product: { name: "procps-devel-3.3.15-lp151.6.3.1.i586", product_id: "procps-devel-3.3.15-lp151.6.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libprocps7-3.3.15-lp151.6.3.1.x86_64", product: { name: "libprocps7-3.3.15-lp151.6.3.1.x86_64", product_id: "libprocps7-3.3.15-lp151.6.3.1.x86_64", }, }, { category: "product_version", name: "procps-3.3.15-lp151.6.3.1.x86_64", product: { name: "procps-3.3.15-lp151.6.3.1.x86_64", product_id: "procps-3.3.15-lp151.6.3.1.x86_64", }, }, { category: "product_version", name: "procps-devel-3.3.15-lp151.6.3.1.x86_64", product: { name: "procps-devel-3.3.15-lp151.6.3.1.x86_64", product_id: "procps-devel-3.3.15-lp151.6.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.1", product: { name: "openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-lp151.6.3.1.i586 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", }, product_reference: "libprocps7-3.3.15-lp151.6.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-lp151.6.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", }, product_reference: "libprocps7-3.3.15-lp151.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-lp151.6.3.1.i586 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", }, product_reference: "procps-3.3.15-lp151.6.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-lp151.6.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", }, product_reference: "procps-3.3.15-lp151.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-lp151.6.3.1.i586 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", }, product_reference: "procps-devel-3.3.15-lp151.6.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-lp151.6.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", }, product_reference: "procps-devel-3.3.15-lp151.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1122", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1122", url: "https://www.suse.com/security/cve/CVE-2018-1122", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1122", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1122", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1122", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1122", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1122", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1122", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-26T14:24:29Z", details: "important", }, ], title: "CVE-2018-1122", }, { cve: "CVE-2018-1123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1123", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1123", url: "https://www.suse.com/security/cve/CVE-2018-1123", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1123", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1123", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1123", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1123", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1123", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1123", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-26T14:24:29Z", details: "important", }, ], title: "CVE-2018-1123", }, { cve: "CVE-2018-1124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1124", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1124", url: "https://www.suse.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1124", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1124", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1124", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1124", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1124", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1124", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-26T14:24:29Z", details: "important", }, ], title: "CVE-2018-1124", }, { cve: "CVE-2018-1125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1125", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1125", url: "https://www.suse.com/security/cve/CVE-2018-1125", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1125", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1125", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1125", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1125", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1125", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1125", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-26T14:24:29Z", details: "important", }, ], title: "CVE-2018-1125", }, { cve: "CVE-2018-1126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1126", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1126", url: "https://www.suse.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1126", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1126", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1126", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1126", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1126", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1126", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:libprocps7-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-3.3.15-lp151.6.3.1.x86_64", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.i586", "openSUSE Leap 15.1:procps-devel-3.3.15-lp151.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-26T14:24:29Z", details: "important", }, ], title: "CVE-2018-1126", }, ], }
opensuse-su-2024:12565-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "libproc2-0-4.0.2-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the libproc2-0-4.0.2-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12565", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12565-1.json", }, { category: "self", summary: "SUSE CVE CVE-2018-1122 page", url: "https://www.suse.com/security/cve/CVE-2018-1122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1123 page", url: "https://www.suse.com/security/cve/CVE-2018-1123/", }, { category: "self", summary: "SUSE CVE CVE-2018-1124 page", url: "https://www.suse.com/security/cve/CVE-2018-1124/", }, { category: "self", summary: "SUSE CVE CVE-2018-1125 page", url: "https://www.suse.com/security/cve/CVE-2018-1125/", }, { category: "self", summary: "SUSE CVE CVE-2018-1126 page", url: "https://www.suse.com/security/cve/CVE-2018-1126/", }, ], title: "libproc2-0-4.0.2-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12565-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libproc2-0-4.0.2-1.1.aarch64", product: { name: "libproc2-0-4.0.2-1.1.aarch64", product_id: "libproc2-0-4.0.2-1.1.aarch64", }, }, { category: "product_version", name: "procps4-4.0.2-1.1.aarch64", product: { name: "procps4-4.0.2-1.1.aarch64", product_id: "procps4-4.0.2-1.1.aarch64", }, }, { category: "product_version", name: "procps4-devel-4.0.2-1.1.aarch64", product: { name: "procps4-devel-4.0.2-1.1.aarch64", product_id: "procps4-devel-4.0.2-1.1.aarch64", }, }, { category: "product_version", name: "procps4-lang-4.0.2-1.1.aarch64", product: { name: "procps4-lang-4.0.2-1.1.aarch64", product_id: "procps4-lang-4.0.2-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libproc2-0-4.0.2-1.1.ppc64le", product: { name: "libproc2-0-4.0.2-1.1.ppc64le", product_id: "libproc2-0-4.0.2-1.1.ppc64le", }, }, { category: "product_version", name: "procps4-4.0.2-1.1.ppc64le", product: { name: "procps4-4.0.2-1.1.ppc64le", product_id: "procps4-4.0.2-1.1.ppc64le", }, }, { category: "product_version", name: "procps4-devel-4.0.2-1.1.ppc64le", product: { name: "procps4-devel-4.0.2-1.1.ppc64le", product_id: "procps4-devel-4.0.2-1.1.ppc64le", }, }, { category: "product_version", name: "procps4-lang-4.0.2-1.1.ppc64le", product: { name: "procps4-lang-4.0.2-1.1.ppc64le", product_id: "procps4-lang-4.0.2-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libproc2-0-4.0.2-1.1.s390x", product: { name: "libproc2-0-4.0.2-1.1.s390x", product_id: "libproc2-0-4.0.2-1.1.s390x", }, }, { category: "product_version", name: "procps4-4.0.2-1.1.s390x", product: { name: "procps4-4.0.2-1.1.s390x", product_id: "procps4-4.0.2-1.1.s390x", }, }, { category: "product_version", name: "procps4-devel-4.0.2-1.1.s390x", product: { name: "procps4-devel-4.0.2-1.1.s390x", product_id: "procps4-devel-4.0.2-1.1.s390x", }, }, { category: "product_version", name: "procps4-lang-4.0.2-1.1.s390x", product: { name: "procps4-lang-4.0.2-1.1.s390x", product_id: "procps4-lang-4.0.2-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libproc2-0-4.0.2-1.1.x86_64", product: { name: "libproc2-0-4.0.2-1.1.x86_64", product_id: "libproc2-0-4.0.2-1.1.x86_64", }, }, { category: "product_version", name: "procps4-4.0.2-1.1.x86_64", product: { name: "procps4-4.0.2-1.1.x86_64", product_id: "procps4-4.0.2-1.1.x86_64", }, }, { category: "product_version", name: "procps4-devel-4.0.2-1.1.x86_64", product: { name: "procps4-devel-4.0.2-1.1.x86_64", product_id: "procps4-devel-4.0.2-1.1.x86_64", }, }, { category: "product_version", name: "procps4-lang-4.0.2-1.1.x86_64", product: { name: "procps4-lang-4.0.2-1.1.x86_64", product_id: "procps4-lang-4.0.2-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libproc2-0-4.0.2-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", }, product_reference: "libproc2-0-4.0.2-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libproc2-0-4.0.2-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", }, product_reference: "libproc2-0-4.0.2-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libproc2-0-4.0.2-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", }, product_reference: "libproc2-0-4.0.2-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libproc2-0-4.0.2-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", }, product_reference: "libproc2-0-4.0.2-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-4.0.2-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", }, product_reference: "procps4-4.0.2-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-4.0.2-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", }, product_reference: "procps4-4.0.2-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-4.0.2-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", }, product_reference: "procps4-4.0.2-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-4.0.2-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", }, product_reference: "procps4-4.0.2-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-devel-4.0.2-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", }, product_reference: "procps4-devel-4.0.2-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-devel-4.0.2-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", }, product_reference: "procps4-devel-4.0.2-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-devel-4.0.2-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", }, product_reference: "procps4-devel-4.0.2-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-devel-4.0.2-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", }, product_reference: "procps4-devel-4.0.2-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-lang-4.0.2-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", }, product_reference: "procps4-lang-4.0.2-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-lang-4.0.2-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", }, product_reference: "procps4-lang-4.0.2-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-lang-4.0.2-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", }, product_reference: "procps4-lang-4.0.2-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "procps4-lang-4.0.2-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", }, product_reference: "procps4-lang-4.0.2-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1122", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1122", url: "https://www.suse.com/security/cve/CVE-2018-1122", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1122", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1122", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1122", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1122", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1122", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1122", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1122", }, { cve: "CVE-2018-1123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1123", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1123", url: "https://www.suse.com/security/cve/CVE-2018-1123", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1123", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1123", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1123", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1123", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1123", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1123", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1123", }, { cve: "CVE-2018-1124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1124", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1124", url: "https://www.suse.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1124", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1124", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1124", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1124", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1124", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1124", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1124", }, { cve: "CVE-2018-1125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1125", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1125", url: "https://www.suse.com/security/cve/CVE-2018-1125", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1125", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1125", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1125", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1125", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1125", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1125", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1125", }, { cve: "CVE-2018-1126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1126", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1126", url: "https://www.suse.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1126", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1126", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1126", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1126", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1126", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1126", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.s390x", "openSUSE Tumbleweed:libproc2-0-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-devel-4.0.2-1.1.x86_64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.aarch64", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.ppc64le", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.s390x", "openSUSE Tumbleweed:procps4-lang-4.0.2-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1126", }, ], }
opensuse-su-2019:2379-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for procps", title: "Title of the patch", }, { category: "description", text: "This update for procps fixes the following issues:\n\nprocps was updated to 3.3.15. (bsc#1092100)\n\nFollowing security issues were fixed:\n\n- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top\n with HOME unset in an attacker-controlled directory, the attacker could have\n achieved privilege escalation by exploiting one of several vulnerabilities in\n the config_file() function (bsc#1092100).\n- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.\n Inbuilt protection in ps maped a guard page at the end of the overflowed\n buffer, ensuring that the impact of this flaw is limited to a crash (temporary\n denial of service) (bsc#1092100).\n- CVE-2018-1124: Prevent multiple integer overflows leading to a heap\n corruption in file2strvec function. This allowed a privilege escalation for a\n local attacker who can create entries in procfs by starting processes, which\n could result in crashes or arbitrary code execution in proc utilities run by\n other users (bsc#1092100).\n- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was\n mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).\n- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent\n truncation/integer overflow issues (bsc#1092100).\n\n\nAlso this non-security issue was fixed:\n\n- Fix CPU summary showing old data. (bsc#1121753)\n\nThe update to 3.3.15 contains the following fixes:\n\n* library: Increment to 8:0:1\n No removals, no new functions\n Changes: slab and pid structures\n* library: Just check for SIGLOST and don't delete it\n* library: Fix integer overflow and LPE in file2strvec CVE-2018-1124\n* library: Use size_t for alloc functions CVE-2018-1126\n* library: Increase comm size to 64\n* pgrep: Fix stack-based buffer overflow CVE-2018-1125\n* pgrep: Remove >15 warning as comm can be longer\n* ps: Fix buffer overflow in output buffer, causing DOS CVE-2018-1123\n* ps: Increase command name selection field to 64\n* top: Don't use cwd for location of config CVE-2018-1122\n* update translations\n* library: build on non-glibc systems\n* free: fix scaling on 32-bit systems\n* Revert 'Support running with child namespaces'\n* library: Increment to 7:0:1\n No changes, no removals\n New fuctions: numa_init, numa_max_node, numa_node_of_cpu, numa_uninit, xalloc_err_handler\n* doc: Document I idle state in ps.1 and top.1\n* free: fix some of the SI multiples\n* kill: -l space between name parses correctly\n* library: dont use vm_min_free on non Linux\n* library: don't strip off wchan prefixes (ps & top)\n* pgrep: warn about 15+ char name only if -f not used\n* pgrep/pkill: only match in same namespace by default\n* pidof: specify separator between pids\n* pkill: Return 0 only if we can kill process\n* pmap: fix duplicate output line under '-x' option\n* ps: avoid eip/esp address truncations\n* ps: recognizes SCHED_DEADLINE as valid CPU scheduler\n* ps: display NUMA node under which a thread ran\n* ps: Add seconds display for cputime and time\n* ps: Add LUID field\n* sysctl: Permit empty string for value\n* sysctl: Don't segv when file not available\n* sysctl: Read and write large buffers\n* top: add config file support for XDG specification\n* top: eliminated minor libnuma memory leak\n* top: show fewer memory decimal places (configurable)\n* top: provide command line switch for memory scaling\n* top: provide command line switch for CPU States\n* top: provides more accurate cpu usage at startup\n* top: display NUMA node under which a thread ran\n* top: fix argument parsing quirk resulting in SEGV\n* top: delay interval accepts non-locale radix point\n* top: address a wishlist man page NLS suggestion\n* top: fix potential distortion in 'Mem' graph display\n* top: provide proper multi-byte string handling\n* top: startup defaults are fully customizable\n* watch: define HOST_NAME_MAX where not defined\n* vmstat: Fix alignment for disk partition format\n* watch: Support ANSI 39,49 reset sequences\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-2379", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2379-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:2379-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/373YKSXQ2VINMOOBAFFGM6KATT7DSMIN/#373YKSXQ2VINMOOBAFFGM6KATT7DSMIN", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:2379-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/373YKSXQ2VINMOOBAFFGM6KATT7DSMIN/#373YKSXQ2VINMOOBAFFGM6KATT7DSMIN", }, { category: "self", summary: "SUSE Bug 1092100", url: "https://bugzilla.suse.com/1092100", }, { category: "self", summary: "SUSE Bug 1121753", url: "https://bugzilla.suse.com/1121753", }, { category: "self", summary: "SUSE CVE CVE-2018-1122 page", url: "https://www.suse.com/security/cve/CVE-2018-1122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1123 page", url: "https://www.suse.com/security/cve/CVE-2018-1123/", }, { category: "self", summary: "SUSE CVE CVE-2018-1124 page", url: "https://www.suse.com/security/cve/CVE-2018-1124/", }, { category: "self", summary: "SUSE CVE CVE-2018-1125 page", url: "https://www.suse.com/security/cve/CVE-2018-1125/", }, { category: "self", summary: "SUSE CVE CVE-2018-1126 page", url: "https://www.suse.com/security/cve/CVE-2018-1126/", }, ], title: "Security update for procps", tracking: { current_release_date: "2019-10-26T16:24:57Z", generator: { date: "2019-10-26T16:24:57Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:2379-1", initial_release_date: "2019-10-26T16:24:57Z", revision_history: [ { date: "2019-10-26T16:24:57Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libprocps7-3.3.15-lp150.5.3.1.i586", product: { name: "libprocps7-3.3.15-lp150.5.3.1.i586", product_id: "libprocps7-3.3.15-lp150.5.3.1.i586", }, }, { category: "product_version", name: "procps-3.3.15-lp150.5.3.1.i586", product: { name: "procps-3.3.15-lp150.5.3.1.i586", product_id: "procps-3.3.15-lp150.5.3.1.i586", }, }, { category: "product_version", name: "procps-devel-3.3.15-lp150.5.3.1.i586", product: { name: "procps-devel-3.3.15-lp150.5.3.1.i586", product_id: "procps-devel-3.3.15-lp150.5.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libprocps7-3.3.15-lp150.5.3.1.x86_64", product: { name: "libprocps7-3.3.15-lp150.5.3.1.x86_64", product_id: "libprocps7-3.3.15-lp150.5.3.1.x86_64", }, }, { category: "product_version", name: "procps-3.3.15-lp150.5.3.1.x86_64", product: { name: "procps-3.3.15-lp150.5.3.1.x86_64", product_id: "procps-3.3.15-lp150.5.3.1.x86_64", }, }, { category: "product_version", name: "procps-devel-3.3.15-lp150.5.3.1.x86_64", product: { name: "procps-devel-3.3.15-lp150.5.3.1.x86_64", product_id: "procps-devel-3.3.15-lp150.5.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.0", product: { name: "openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.0", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-lp150.5.3.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", }, product_reference: "libprocps7-3.3.15-lp150.5.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-lp150.5.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", }, product_reference: "libprocps7-3.3.15-lp150.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-lp150.5.3.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", }, product_reference: "procps-3.3.15-lp150.5.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-lp150.5.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", }, product_reference: "procps-3.3.15-lp150.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-lp150.5.3.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", }, product_reference: "procps-devel-3.3.15-lp150.5.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-lp150.5.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", }, product_reference: "procps-devel-3.3.15-lp150.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1122", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1122", url: "https://www.suse.com/security/cve/CVE-2018-1122", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1122", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1122", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1122", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1122", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1122", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1122", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-26T16:24:57Z", details: "important", }, ], title: "CVE-2018-1122", }, { cve: "CVE-2018-1123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1123", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1123", url: "https://www.suse.com/security/cve/CVE-2018-1123", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1123", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1123", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1123", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1123", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1123", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1123", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-26T16:24:57Z", details: "important", }, ], title: "CVE-2018-1123", }, { cve: "CVE-2018-1124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1124", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1124", url: "https://www.suse.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1124", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1124", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1124", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1124", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1124", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1124", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-26T16:24:57Z", details: "important", }, ], title: "CVE-2018-1124", }, { cve: "CVE-2018-1125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1125", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1125", url: "https://www.suse.com/security/cve/CVE-2018-1125", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1125", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1125", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1125", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1125", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1125", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1125", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-26T16:24:57Z", details: "important", }, ], title: "CVE-2018-1125", }, { cve: "CVE-2018-1126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1126", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1126", url: "https://www.suse.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1126", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1126", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1126", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1126", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1126", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1126", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:libprocps7-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-3.3.15-lp150.5.3.1.x86_64", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.i586", "openSUSE Leap 15.0:procps-devel-3.3.15-lp150.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-26T16:24:57Z", details: "important", }, ], title: "CVE-2018-1126", }, ], }
suse-su-2019:0450-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for procps", title: "Title of the patch", }, { category: "description", text: "\n \nThis update for procps fixes the following security issues:\n\n- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top\n with HOME unset in an attacker-controlled directory, the attacker could have\n achieved privilege escalation by exploiting one of several vulnerabilities in\n the config_file() function (bsc#1092100).\n- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.\n Inbuilt protection in ps maped a guard page at the end of the overflowed\n buffer, ensuring that the impact of this flaw is limited to a crash (temporary\n denial of service) (bsc#1092100).\n- CVE-2018-1124: Prevent multiple integer overflows leading to a heap\n corruption in file2strvec function. This allowed a privilege escalation for a\n local attacker who can create entries in procfs by starting processes, which\n could result in crashes or arbitrary code execution in proc utilities run by\n other users (bsc#1092100).\n- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was\n mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).\n- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent\n truncation/integer overflow issues (bsc#1092100).\n\n(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)\n\nAlso the following non-security issue was fixed:\n\n- Fix CPU summary showing old data. (bsc#1121753)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-450,SUSE-OpenStack-Cloud-7-2019-450,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-450,SUSE-SLE-DESKTOP-12-SP3-2019-450,SUSE-SLE-DESKTOP-12-SP4-2019-450,SUSE-SLE-SAP-12-SP2-2019-450,SUSE-SLE-SDK-12-SP3-2019-450,SUSE-SLE-SDK-12-SP4-2019-450,SUSE-SLE-SERVER-12-2019-450,SUSE-SLE-SERVER-12-SP1-2019-450,SUSE-SLE-SERVER-12-SP2-2019-450,SUSE-SLE-SERVER-12-SP2-BCL-2019-450,SUSE-SLE-SERVER-12-SP3-2019-450,SUSE-SLE-SERVER-12-SP4-2019-450,SUSE-Storage-4-2019-450", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0450-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:0450-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190450-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:0450-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html", }, { category: "self", summary: "SUSE Bug 1092100", url: "https://bugzilla.suse.com/1092100", }, { category: "self", summary: "SUSE Bug 1121753", url: "https://bugzilla.suse.com/1121753", }, { category: "self", summary: "SUSE CVE CVE-2018-1122 page", url: "https://www.suse.com/security/cve/CVE-2018-1122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1123 page", url: "https://www.suse.com/security/cve/CVE-2018-1123/", }, { category: "self", summary: "SUSE CVE CVE-2018-1124 page", url: "https://www.suse.com/security/cve/CVE-2018-1124/", }, { category: "self", summary: "SUSE CVE CVE-2018-1125 page", url: "https://www.suse.com/security/cve/CVE-2018-1125/", }, { category: "self", summary: "SUSE CVE CVE-2018-1126 page", url: "https://www.suse.com/security/cve/CVE-2018-1126/", }, ], title: "Security update for procps", tracking: { current_release_date: "2019-02-20T15:43:19Z", generator: { date: "2019-02-20T15:43:19Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:0450-1", initial_release_date: "2019-02-20T15:43:19Z", revision_history: [ { date: "2019-02-20T15:43:19Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.aarch64", product: { name: "libprocps3-3.3.9-11.18.1.aarch64", product_id: "libprocps3-3.3.9-11.18.1.aarch64", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.aarch64", product: { name: "procps-3.3.9-11.18.1.aarch64", product_id: "procps-3.3.9-11.18.1.aarch64", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.aarch64", product: { name: "procps-devel-3.3.9-11.18.1.aarch64", product_id: "procps-devel-3.3.9-11.18.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.i586", product: { name: "libprocps3-3.3.9-11.18.1.i586", product_id: "libprocps3-3.3.9-11.18.1.i586", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.i586", product: { name: "procps-3.3.9-11.18.1.i586", product_id: "procps-3.3.9-11.18.1.i586", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.i586", product: { name: "procps-devel-3.3.9-11.18.1.i586", product_id: "procps-devel-3.3.9-11.18.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.ppc64le", product: { name: "libprocps3-3.3.9-11.18.1.ppc64le", product_id: "libprocps3-3.3.9-11.18.1.ppc64le", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.ppc64le", product: { name: "procps-3.3.9-11.18.1.ppc64le", product_id: "procps-3.3.9-11.18.1.ppc64le", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.ppc64le", product: { name: "procps-devel-3.3.9-11.18.1.ppc64le", product_id: "procps-devel-3.3.9-11.18.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.s390", product: { name: "libprocps3-3.3.9-11.18.1.s390", product_id: "libprocps3-3.3.9-11.18.1.s390", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.s390", product: { name: "procps-3.3.9-11.18.1.s390", product_id: "procps-3.3.9-11.18.1.s390", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.s390", product: { name: "procps-devel-3.3.9-11.18.1.s390", product_id: "procps-devel-3.3.9-11.18.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.s390x", product: { name: "libprocps3-3.3.9-11.18.1.s390x", product_id: "libprocps3-3.3.9-11.18.1.s390x", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.s390x", product: { name: "procps-3.3.9-11.18.1.s390x", product_id: "procps-3.3.9-11.18.1.s390x", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.s390x", product: { name: "procps-devel-3.3.9-11.18.1.s390x", product_id: "procps-devel-3.3.9-11.18.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.x86_64", product: { name: "libprocps3-3.3.9-11.18.1.x86_64", product_id: "libprocps3-3.3.9-11.18.1.x86_64", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.x86_64", product: { name: "procps-3.3.9-11.18.1.x86_64", product_id: "procps-3.3.9-11.18.1.x86_64", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.x86_64", product: { name: "procps-devel-3.3.9-11.18.1.x86_64", product_id: "procps-devel-3.3.9-11.18.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP4", product: { name: "SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12-LTSS", product: { name: "SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4", product: { name: "SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 4", product: { name: "SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4", product_identification_helper: { cpe: "cpe:/o:suse:ses:4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", }, product_reference: "libprocps3-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", }, product_reference: "procps-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", }, product_reference: "procps-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.18.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", }, product_reference: "procps-devel-3.3.9-11.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", }, product_reference: "procps-devel-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", }, product_reference: "procps-devel-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", }, product_reference: "procps-devel-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.18.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", }, product_reference: "procps-devel-3.3.9-11.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", }, product_reference: "procps-devel-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", }, product_reference: "procps-devel-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", }, product_reference: "procps-devel-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", }, product_reference: "libprocps3-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", }, product_reference: "procps-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", }, product_reference: "procps-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", }, product_reference: "libprocps3-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", }, product_reference: "procps-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", }, product_reference: "procps-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", }, product_reference: "libprocps3-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", }, product_reference: "procps-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", }, product_reference: "procps-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", }, product_reference: "libprocps3-3.3.9-11.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", }, product_reference: "libprocps3-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", }, product_reference: "procps-3.3.9-11.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", }, product_reference: "procps-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", }, product_reference: "procps-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", }, product_reference: "libprocps3-3.3.9-11.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", }, product_reference: "libprocps3-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", }, product_reference: "procps-3.3.9-11.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", }, product_reference: "procps-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", }, product_reference: "procps-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", }, product_reference: "libprocps3-3.3.9-11.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", }, product_reference: "libprocps3-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", }, product_reference: "procps-3.3.9-11.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", }, product_reference: "procps-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", }, product_reference: "procps-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", }, product_reference: "libprocps3-3.3.9-11.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", }, product_reference: "libprocps3-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", }, product_reference: "procps-3.3.9-11.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", }, product_reference: "procps-3.3.9-11.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", }, product_reference: "procps-3.3.9-11.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1122", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1122", url: "https://www.suse.com/security/cve/CVE-2018-1122", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1122", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1122", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1122", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1122", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1122", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1122", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-20T15:43:19Z", details: "important", }, ], title: "CVE-2018-1122", }, { cve: "CVE-2018-1123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1123", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1123", url: "https://www.suse.com/security/cve/CVE-2018-1123", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1123", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1123", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1123", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1123", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1123", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1123", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-20T15:43:19Z", details: "important", }, ], title: "CVE-2018-1123", }, { cve: "CVE-2018-1124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1124", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1124", url: "https://www.suse.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1124", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1124", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1124", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1124", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1124", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1124", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-20T15:43:19Z", details: "important", }, ], title: "CVE-2018-1124", }, { cve: "CVE-2018-1125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1125", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1125", url: "https://www.suse.com/security/cve/CVE-2018-1125", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1125", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1125", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1125", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1125", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1125", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1125", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-20T15:43:19Z", details: "important", }, ], title: "CVE-2018-1125", }, { cve: "CVE-2018-1126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1126", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1126", url: "https://www.suse.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1126", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1126", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1126", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1126", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1126", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1126", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Enterprise Storage 4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:procps-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:procps-devel-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:libprocps3-3.3.9-11.18.1.x86_64", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.s390x", "SUSE OpenStack Cloud 7:procps-3.3.9-11.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-20T15:43:19Z", details: "important", }, ], title: "CVE-2018-1126", }, ], }
suse-su-2018:2451-2
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for procps", title: "Title of the patch", }, { category: "description", text: "This update for procps fixes the following security issues:\n\n- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top\n with HOME unset in an attacker-controlled directory, the attacker could have\n achieved privilege escalation by exploiting one of several vulnerabilities in\n the config_file() function (bsc#1092100).\n- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.\n Inbuilt protection in ps maped a guard page at the end of the overflowed\n buffer, ensuring that the impact of this flaw is limited to a crash (temporary\n denial of service) (bsc#1092100).\n- CVE-2018-1124: Prevent multiple integer overflows leading to a heap\n corruption in file2strvec function. This allowed a privilege escalation for a\n local attacker who can create entries in procfs by starting processes, which\n could result in crashes or arbitrary code execution in proc utilities run by\n other users (bsc#1092100).\n- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was\n mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).\n- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent\n truncation/integer overflow issues (bsc#1092100).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1696,SUSE-SLE-DESKTOP-12-SP3-2018-1696,SUSE-SLE-SDK-12-SP3-2018-1696,SUSE-SLE-SERVER-12-SP3-2018-1696", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2451-2.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2451-2", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182451-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2451-2", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html", }, { category: "self", summary: "SUSE Bug 1092100", url: "https://bugzilla.suse.com/1092100", }, { category: "self", summary: "SUSE CVE CVE-2018-1122 page", url: "https://www.suse.com/security/cve/CVE-2018-1122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1123 page", url: "https://www.suse.com/security/cve/CVE-2018-1123/", }, { category: "self", summary: "SUSE CVE CVE-2018-1124 page", url: "https://www.suse.com/security/cve/CVE-2018-1124/", }, { category: "self", summary: "SUSE CVE CVE-2018-1125 page", url: "https://www.suse.com/security/cve/CVE-2018-1125/", }, { category: "self", summary: "SUSE CVE CVE-2018-1126 page", url: "https://www.suse.com/security/cve/CVE-2018-1126/", }, ], title: "Security update for procps", tracking: { current_release_date: "2018-11-26T16:46:46Z", generator: { date: "2018-11-26T16:46:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2451-2", initial_release_date: "2018-11-26T16:46:46Z", revision_history: [ { date: "2018-11-26T16:46:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "procps-devel-3.3.9-11.14.1.aarch64", product: { name: "procps-devel-3.3.9-11.14.1.aarch64", product_id: "procps-devel-3.3.9-11.14.1.aarch64", }, }, { category: "product_version", name: "libprocps3-3.3.9-11.14.1.aarch64", product: { name: "libprocps3-3.3.9-11.14.1.aarch64", product_id: "libprocps3-3.3.9-11.14.1.aarch64", }, }, { category: "product_version", name: "procps-3.3.9-11.14.1.aarch64", product: { name: "procps-3.3.9-11.14.1.aarch64", product_id: "procps-3.3.9-11.14.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "procps-devel-3.3.9-11.14.1.ppc64le", product: { name: "procps-devel-3.3.9-11.14.1.ppc64le", product_id: "procps-devel-3.3.9-11.14.1.ppc64le", }, }, { category: "product_version", name: "libprocps3-3.3.9-11.14.1.ppc64le", product: { name: "libprocps3-3.3.9-11.14.1.ppc64le", product_id: "libprocps3-3.3.9-11.14.1.ppc64le", }, }, { category: "product_version", name: "procps-3.3.9-11.14.1.ppc64le", product: { name: "procps-3.3.9-11.14.1.ppc64le", product_id: "procps-3.3.9-11.14.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "procps-devel-3.3.9-11.14.1.s390x", product: { name: "procps-devel-3.3.9-11.14.1.s390x", product_id: "procps-devel-3.3.9-11.14.1.s390x", }, }, { category: "product_version", name: "libprocps3-3.3.9-11.14.1.s390x", product: { name: "libprocps3-3.3.9-11.14.1.s390x", product_id: "libprocps3-3.3.9-11.14.1.s390x", }, }, { category: "product_version", name: "procps-3.3.9-11.14.1.s390x", product: { name: "procps-3.3.9-11.14.1.s390x", product_id: "procps-3.3.9-11.14.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.14.1.x86_64", product: { name: "libprocps3-3.3.9-11.14.1.x86_64", product_id: "libprocps3-3.3.9-11.14.1.x86_64", }, }, { category: "product_version", name: "procps-3.3.9-11.14.1.x86_64", product: { name: "procps-3.3.9-11.14.1.x86_64", product_id: "procps-3.3.9-11.14.1.x86_64", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.14.1.x86_64", product: { name: "procps-devel-3.3.9-11.14.1.x86_64", product_id: "procps-devel-3.3.9-11.14.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.14.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.14.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", }, product_reference: "procps-3.3.9-11.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.14.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", }, product_reference: "procps-devel-3.3.9-11.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.14.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", }, product_reference: "procps-devel-3.3.9-11.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.14.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", }, product_reference: "procps-devel-3.3.9-11.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.14.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", }, product_reference: "procps-devel-3.3.9-11.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.14.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", }, product_reference: "libprocps3-3.3.9-11.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.14.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", }, product_reference: "libprocps3-3.3.9-11.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.14.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", }, product_reference: "procps-3.3.9-11.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", }, product_reference: "procps-3.3.9-11.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.14.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", }, product_reference: "procps-3.3.9-11.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", }, product_reference: "procps-3.3.9-11.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.14.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", }, product_reference: "libprocps3-3.3.9-11.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.14.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", }, product_reference: "libprocps3-3.3.9-11.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.14.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", }, product_reference: "procps-3.3.9-11.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", }, product_reference: "procps-3.3.9-11.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.14.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", }, product_reference: "procps-3.3.9-11.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", }, product_reference: "procps-3.3.9-11.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1122", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1122", url: "https://www.suse.com/security/cve/CVE-2018-1122", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1122", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1122", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1122", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1122", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1122", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1122", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-26T16:46:46Z", details: "moderate", }, ], title: "CVE-2018-1122", }, { cve: "CVE-2018-1123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1123", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1123", url: "https://www.suse.com/security/cve/CVE-2018-1123", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1123", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1123", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1123", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1123", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1123", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1123", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-26T16:46:46Z", details: "moderate", }, ], title: "CVE-2018-1123", }, { cve: "CVE-2018-1124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1124", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1124", url: "https://www.suse.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1124", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1124", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1124", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1124", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1124", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1124", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-26T16:46:46Z", details: "moderate", }, ], title: "CVE-2018-1124", }, { cve: "CVE-2018-1125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1125", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1125", url: "https://www.suse.com/security/cve/CVE-2018-1125", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1125", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1125", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1125", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1125", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1125", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1125", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-26T16:46:46Z", details: "moderate", }, ], title: "CVE-2018-1125", }, { cve: "CVE-2018-1126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1126", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1126", url: "https://www.suse.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1126", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1126", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1126", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1126", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1126", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1126", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-26T16:46:46Z", details: "moderate", }, ], title: "CVE-2018-1126", }, ], }
suse-su-2019:0450-2
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for procps", title: "Title of the patch", }, { category: "description", text: "\n \nThis update for procps fixes the following security issues:\n\n- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top\n with HOME unset in an attacker-controlled directory, the attacker could have\n achieved privilege escalation by exploiting one of several vulnerabilities in\n the config_file() function (bsc#1092100).\n- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.\n Inbuilt protection in ps maped a guard page at the end of the overflowed\n buffer, ensuring that the impact of this flaw is limited to a crash (temporary\n denial of service) (bsc#1092100).\n- CVE-2018-1124: Prevent multiple integer overflows leading to a heap\n corruption in file2strvec function. This allowed a privilege escalation for a\n local attacker who can create entries in procfs by starting processes, which\n could result in crashes or arbitrary code execution in proc utilities run by\n other users (bsc#1092100).\n- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was\n mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).\n- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent\n truncation/integer overflow issues (bsc#1092100).\n\n(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)\n\nAlso the following non-security issue was fixed:\n\n- Fix CPU summary showing old data. (bsc#1121753)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-450,SUSE-SLE-SAP-12-SP1-2019-450", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0450-2.json", }, { category: "self", summary: "URL for SUSE-SU-2019:0450-2", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190450-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:0450-2", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html", }, { category: "self", summary: "SUSE Bug 1092100", url: "https://bugzilla.suse.com/1092100", }, { category: "self", summary: "SUSE Bug 1121753", url: "https://bugzilla.suse.com/1121753", }, { category: "self", summary: "SUSE CVE CVE-2018-1122 page", url: "https://www.suse.com/security/cve/CVE-2018-1122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1123 page", url: "https://www.suse.com/security/cve/CVE-2018-1123/", }, { category: "self", summary: "SUSE CVE CVE-2018-1124 page", url: "https://www.suse.com/security/cve/CVE-2018-1124/", }, { category: "self", summary: "SUSE CVE CVE-2018-1125 page", url: "https://www.suse.com/security/cve/CVE-2018-1125/", }, { category: "self", summary: "SUSE CVE CVE-2018-1126 page", url: "https://www.suse.com/security/cve/CVE-2018-1126/", }, ], title: "Security update for procps", tracking: { current_release_date: "2019-04-27T13:16:38Z", generator: { date: "2019-04-27T13:16:38Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:0450-2", initial_release_date: "2019-04-27T13:16:38Z", revision_history: [ { date: "2019-04-27T13:16:38Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.aarch64", product: { name: "libprocps3-3.3.9-11.18.1.aarch64", product_id: "libprocps3-3.3.9-11.18.1.aarch64", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.aarch64", product: { name: "procps-3.3.9-11.18.1.aarch64", product_id: "procps-3.3.9-11.18.1.aarch64", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.aarch64", product: { name: "procps-devel-3.3.9-11.18.1.aarch64", product_id: "procps-devel-3.3.9-11.18.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.i586", product: { name: "libprocps3-3.3.9-11.18.1.i586", product_id: "libprocps3-3.3.9-11.18.1.i586", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.i586", product: { name: "procps-3.3.9-11.18.1.i586", product_id: "procps-3.3.9-11.18.1.i586", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.i586", product: { name: "procps-devel-3.3.9-11.18.1.i586", product_id: "procps-devel-3.3.9-11.18.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.ppc64le", product: { name: "libprocps3-3.3.9-11.18.1.ppc64le", product_id: "libprocps3-3.3.9-11.18.1.ppc64le", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.ppc64le", product: { name: "procps-3.3.9-11.18.1.ppc64le", product_id: "procps-3.3.9-11.18.1.ppc64le", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.ppc64le", product: { name: "procps-devel-3.3.9-11.18.1.ppc64le", product_id: "procps-devel-3.3.9-11.18.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.s390", product: { name: "libprocps3-3.3.9-11.18.1.s390", product_id: "libprocps3-3.3.9-11.18.1.s390", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.s390", product: { name: "procps-3.3.9-11.18.1.s390", product_id: "procps-3.3.9-11.18.1.s390", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.s390", product: { name: "procps-devel-3.3.9-11.18.1.s390", product_id: "procps-devel-3.3.9-11.18.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.s390x", product: { name: "libprocps3-3.3.9-11.18.1.s390x", product_id: "libprocps3-3.3.9-11.18.1.s390x", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.s390x", product: { name: "procps-3.3.9-11.18.1.s390x", product_id: "procps-3.3.9-11.18.1.s390x", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.s390x", product: { name: "procps-devel-3.3.9-11.18.1.s390x", product_id: "procps-devel-3.3.9-11.18.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.18.1.x86_64", product: { name: "libprocps3-3.3.9-11.18.1.x86_64", product_id: "libprocps3-3.3.9-11.18.1.x86_64", }, }, { category: "product_version", name: "procps-3.3.9-11.18.1.x86_64", product: { name: "procps-3.3.9-11.18.1.x86_64", product_id: "procps-3.3.9-11.18.1.x86_64", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.18.1.x86_64", product: { name: "procps-devel-3.3.9-11.18.1.x86_64", product_id: "procps-devel-3.3.9-11.18.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", }, product_reference: "procps-3.3.9-11.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1122", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1122", url: "https://www.suse.com/security/cve/CVE-2018-1122", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1122", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1122", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1122", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1122", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1122", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1122", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:16:38Z", details: "important", }, ], title: "CVE-2018-1122", }, { cve: "CVE-2018-1123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1123", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1123", url: "https://www.suse.com/security/cve/CVE-2018-1123", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1123", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1123", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1123", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1123", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1123", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1123", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:16:38Z", details: "important", }, ], title: "CVE-2018-1123", }, { cve: "CVE-2018-1124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1124", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1124", url: "https://www.suse.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1124", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1124", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1124", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1124", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1124", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1124", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:16:38Z", details: "important", }, ], title: "CVE-2018-1124", }, { cve: "CVE-2018-1125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1125", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1125", url: "https://www.suse.com/security/cve/CVE-2018-1125", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1125", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1125", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1125", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1125", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1125", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1125", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:16:38Z", details: "important", }, ], title: "CVE-2018-1125", }, { cve: "CVE-2018-1126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1126", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1126", url: "https://www.suse.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1126", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1126", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1126", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1126", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1126", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1126", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libprocps3-3.3.9-11.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:procps-3.3.9-11.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:16:38Z", details: "important", }, ], title: "CVE-2018-1126", }, ], }
suse-su-2018:1836-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for procps", title: "Title of the patch", }, { category: "description", text: "This update for procps fixes the following security issues:\n\n- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top\n with HOME unset in an attacker-controlled directory, the attacker could have\n achieved privilege escalation by exploiting one of several vulnerabilities in\n the config_file() function (bsc#1092100).\n- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.\n Inbuilt protection in ps maped a guard page at the end of the overflowed\n buffer, ensuring that the impact of this flaw is limited to a crash (temporary\n denial of service) (bsc#1092100).\n- CVE-2018-1124: Prevent multiple integer overflows leading to a heap\n corruption in file2strvec function. This allowed a privilege escalation for a\n local attacker who can create entries in procfs by starting processes, which\n could result in crashes or arbitrary code execution in proc utilities run by\n other users (bsc#1092100).\n- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was\n mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).\n- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent\n truncation/integer overflow issues (bsc#1092100).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1242,SUSE-SLE-DESKTOP-12-SP3-2018-1242,SUSE-SLE-SDK-12-SP3-2018-1242,SUSE-SLE-SERVER-12-SP3-2018-1242", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1836-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:1836-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20181836-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:1836-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html", }, { category: "self", summary: "SUSE Bug 1092100", url: "https://bugzilla.suse.com/1092100", }, { category: "self", summary: "SUSE CVE CVE-2018-1122 page", url: "https://www.suse.com/security/cve/CVE-2018-1122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1123 page", url: "https://www.suse.com/security/cve/CVE-2018-1123/", }, { category: "self", summary: "SUSE CVE CVE-2018-1124 page", url: "https://www.suse.com/security/cve/CVE-2018-1124/", }, { category: "self", summary: "SUSE CVE CVE-2018-1125 page", url: "https://www.suse.com/security/cve/CVE-2018-1125/", }, { category: "self", summary: "SUSE CVE CVE-2018-1126 page", url: "https://www.suse.com/security/cve/CVE-2018-1126/", }, ], title: "Security update for procps", tracking: { current_release_date: "2018-06-28T11:44:22Z", generator: { date: "2018-06-28T11:44:22Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:1836-1", initial_release_date: "2018-06-28T11:44:22Z", revision_history: [ { date: "2018-06-28T11:44:22Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "procps-devel-3.3.9-11.11.1.aarch64", product: { name: "procps-devel-3.3.9-11.11.1.aarch64", product_id: "procps-devel-3.3.9-11.11.1.aarch64", }, }, { category: "product_version", name: "libprocps3-3.3.9-11.11.1.aarch64", product: { name: "libprocps3-3.3.9-11.11.1.aarch64", product_id: "libprocps3-3.3.9-11.11.1.aarch64", }, }, { category: "product_version", name: "procps-3.3.9-11.11.1.aarch64", product: { name: "procps-3.3.9-11.11.1.aarch64", product_id: "procps-3.3.9-11.11.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "procps-devel-3.3.9-11.11.1.ppc64le", product: { name: "procps-devel-3.3.9-11.11.1.ppc64le", product_id: "procps-devel-3.3.9-11.11.1.ppc64le", }, }, { category: "product_version", name: "libprocps3-3.3.9-11.11.1.ppc64le", product: { name: "libprocps3-3.3.9-11.11.1.ppc64le", product_id: "libprocps3-3.3.9-11.11.1.ppc64le", }, }, { category: "product_version", name: "procps-3.3.9-11.11.1.ppc64le", product: { name: "procps-3.3.9-11.11.1.ppc64le", product_id: "procps-3.3.9-11.11.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "procps-devel-3.3.9-11.11.1.s390x", product: { name: "procps-devel-3.3.9-11.11.1.s390x", product_id: "procps-devel-3.3.9-11.11.1.s390x", }, }, { category: "product_version", name: "libprocps3-3.3.9-11.11.1.s390x", product: { name: "libprocps3-3.3.9-11.11.1.s390x", product_id: "libprocps3-3.3.9-11.11.1.s390x", }, }, { category: "product_version", name: "procps-3.3.9-11.11.1.s390x", product: { name: "procps-3.3.9-11.11.1.s390x", product_id: "procps-3.3.9-11.11.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libprocps3-3.3.9-11.11.1.x86_64", product: { name: "libprocps3-3.3.9-11.11.1.x86_64", product_id: "libprocps3-3.3.9-11.11.1.x86_64", }, }, { category: "product_version", name: "procps-3.3.9-11.11.1.x86_64", product: { name: "procps-3.3.9-11.11.1.x86_64", product_id: "procps-3.3.9-11.11.1.x86_64", }, }, { category: "product_version", name: "procps-devel-3.3.9-11.11.1.x86_64", product: { name: "procps-devel-3.3.9-11.11.1.x86_64", product_id: "procps-devel-3.3.9-11.11.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.11.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.11.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", }, product_reference: "procps-3.3.9-11.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.11.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", }, product_reference: "procps-devel-3.3.9-11.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.11.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", }, product_reference: "procps-devel-3.3.9-11.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.11.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", }, product_reference: "procps-devel-3.3.9-11.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.9-11.11.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", }, product_reference: "procps-devel-3.3.9-11.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.11.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", }, product_reference: "libprocps3-3.3.9-11.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.11.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.11.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", }, product_reference: "libprocps3-3.3.9-11.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.11.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.11.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", }, product_reference: "procps-3.3.9-11.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.11.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", }, product_reference: "procps-3.3.9-11.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.11.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", }, product_reference: "procps-3.3.9-11.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.11.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", }, product_reference: "procps-3.3.9-11.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.11.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", }, product_reference: "libprocps3-3.3.9-11.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.11.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", }, product_reference: "libprocps3-3.3.9-11.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.11.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", }, product_reference: "libprocps3-3.3.9-11.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libprocps3-3.3.9-11.11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", }, product_reference: "libprocps3-3.3.9-11.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.11.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", }, product_reference: "procps-3.3.9-11.11.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.11.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", }, product_reference: "procps-3.3.9-11.11.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.11.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", }, product_reference: "procps-3.3.9-11.11.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.9-11.11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", }, product_reference: "procps-3.3.9-11.11.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1122", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1122", url: "https://www.suse.com/security/cve/CVE-2018-1122", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1122", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1122", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1122", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1122", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1122", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1122", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-06-28T11:44:22Z", details: "moderate", }, ], title: "CVE-2018-1122", }, { cve: "CVE-2018-1123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1123", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1123", url: "https://www.suse.com/security/cve/CVE-2018-1123", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1123", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1123", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1123", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1123", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1123", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1123", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-06-28T11:44:22Z", details: "moderate", }, ], title: "CVE-2018-1123", }, { cve: "CVE-2018-1124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1124", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1124", url: "https://www.suse.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1124", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1124", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1124", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1124", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1124", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1124", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-06-28T11:44:22Z", details: "moderate", }, ], title: "CVE-2018-1124", }, { cve: "CVE-2018-1125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1125", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1125", url: "https://www.suse.com/security/cve/CVE-2018-1125", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1125", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1125", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1125", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1125", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1125", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1125", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-06-28T11:44:22Z", details: "moderate", }, ], title: "CVE-2018-1125", }, { cve: "CVE-2018-1126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1126", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1126", url: "https://www.suse.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1126", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1126", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1126", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1126", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1126", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1126", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libprocps3-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:procps-3.3.9-11.11.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:procps-devel-3.3.9-11.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-06-28T11:44:22Z", details: "moderate", }, ], title: "CVE-2018-1126", }, ], }
suse-su-2019:2730-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for procps", title: "Title of the patch", }, { category: "description", text: "This update for procps fixes the following issues:\n\nprocps was updated to 3.3.15. (bsc#1092100)\n\nFollowing security issues were fixed:\n\n- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top\n with HOME unset in an attacker-controlled directory, the attacker could have\n achieved privilege escalation by exploiting one of several vulnerabilities in\n the config_file() function (bsc#1092100).\n- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.\n Inbuilt protection in ps maped a guard page at the end of the overflowed\n buffer, ensuring that the impact of this flaw is limited to a crash (temporary\n denial of service) (bsc#1092100).\n- CVE-2018-1124: Prevent multiple integer overflows leading to a heap\n corruption in file2strvec function. This allowed a privilege escalation for a\n local attacker who can create entries in procfs by starting processes, which\n could result in crashes or arbitrary code execution in proc utilities run by\n other users (bsc#1092100).\n- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was\n mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).\n- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent\n truncation/integer overflow issues (bsc#1092100).\n\n\nAlso this non-security issue was fixed:\n\n- Fix CPU summary showing old data. (bsc#1121753)\n\nThe update to 3.3.15 contains the following fixes:\n\n* library: Increment to 8:0:1\n No removals, no new functions\n Changes: slab and pid structures\n* library: Just check for SIGLOST and don't delete it\n* library: Fix integer overflow and LPE in file2strvec CVE-2018-1124\n* library: Use size_t for alloc functions CVE-2018-1126\n* library: Increase comm size to 64\n* pgrep: Fix stack-based buffer overflow CVE-2018-1125\n* pgrep: Remove >15 warning as comm can be longer\n* ps: Fix buffer overflow in output buffer, causing DOS CVE-2018-1123\n* ps: Increase command name selection field to 64\n* top: Don't use cwd for location of config CVE-2018-1122\n* update translations\n* library: build on non-glibc systems\n* free: fix scaling on 32-bit systems\n* Revert 'Support running with child namespaces'\n* library: Increment to 7:0:1\n No changes, no removals\n New fuctions: numa_init, numa_max_node, numa_node_of_cpu, numa_uninit, xalloc_err_handler\n* doc: Document I idle state in ps.1 and top.1\n* free: fix some of the SI multiples\n* kill: -l space between name parses correctly\n* library: dont use vm_min_free on non Linux\n* library: don't strip off wchan prefixes (ps & top)\n* pgrep: warn about 15+ char name only if -f not used\n* pgrep/pkill: only match in same namespace by default\n* pidof: specify separator between pids\n* pkill: Return 0 only if we can kill process\n* pmap: fix duplicate output line under '-x' option\n* ps: avoid eip/esp address truncations\n* ps: recognizes SCHED_DEADLINE as valid CPU scheduler\n* ps: display NUMA node under which a thread ran\n* ps: Add seconds display for cputime and time\n* ps: Add LUID field\n* sysctl: Permit empty string for value\n* sysctl: Don't segv when file not available\n* sysctl: Read and write large buffers\n* top: add config file support for XDG specification\n* top: eliminated minor libnuma memory leak\n* top: show fewer memory decimal places (configurable)\n* top: provide command line switch for memory scaling\n* top: provide command line switch for CPU States\n* top: provides more accurate cpu usage at startup\n* top: display NUMA node under which a thread ran\n* top: fix argument parsing quirk resulting in SEGV\n* top: delay interval accepts non-locale radix point\n* top: address a wishlist man page NLS suggestion\n* top: fix potential distortion in 'Mem' graph display\n* top: provide proper multi-byte string handling\n* top: startup defaults are fully customizable\n* watch: define HOST_NAME_MAX where not defined\n* vmstat: Fix alignment for disk partition format\n* watch: Support ANSI 39,49 reset sequences\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-2730,SUSE-SLE-Module-Basesystem-15-2019-2730,SUSE-SLE-Module-Basesystem-15-SP1-2019-2730", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2730-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:2730-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192730-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:2730-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html", }, { category: "self", summary: "SUSE Bug 1092100", url: "https://bugzilla.suse.com/1092100", }, { category: "self", summary: "SUSE Bug 1121753", url: "https://bugzilla.suse.com/1121753", }, { category: "self", summary: "SUSE CVE CVE-2018-1122 page", url: "https://www.suse.com/security/cve/CVE-2018-1122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1123 page", url: "https://www.suse.com/security/cve/CVE-2018-1123/", }, { category: "self", summary: "SUSE CVE CVE-2018-1124 page", url: "https://www.suse.com/security/cve/CVE-2018-1124/", }, { category: "self", summary: "SUSE CVE CVE-2018-1125 page", url: "https://www.suse.com/security/cve/CVE-2018-1125/", }, { category: "self", summary: "SUSE CVE CVE-2018-1126 page", url: "https://www.suse.com/security/cve/CVE-2018-1126/", }, ], title: "Security update for procps", tracking: { current_release_date: "2019-10-21T14:04:59Z", generator: { date: "2019-10-21T14:04:59Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:2730-1", initial_release_date: "2019-10-21T14:04:59Z", revision_history: [ { date: "2019-10-21T14:04:59Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libprocps7-3.3.15-7.7.26.aarch64", product: { name: "libprocps7-3.3.15-7.7.26.aarch64", product_id: "libprocps7-3.3.15-7.7.26.aarch64", }, }, { category: "product_version", name: "procps-3.3.15-7.7.26.aarch64", product: { name: "procps-3.3.15-7.7.26.aarch64", product_id: "procps-3.3.15-7.7.26.aarch64", }, }, { category: "product_version", name: "procps-devel-3.3.15-7.7.26.aarch64", product: { name: "procps-devel-3.3.15-7.7.26.aarch64", product_id: "procps-devel-3.3.15-7.7.26.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libprocps7-3.3.15-7.7.26.i586", product: { name: "libprocps7-3.3.15-7.7.26.i586", product_id: "libprocps7-3.3.15-7.7.26.i586", }, }, { category: "product_version", name: "procps-3.3.15-7.7.26.i586", product: { name: "procps-3.3.15-7.7.26.i586", product_id: "procps-3.3.15-7.7.26.i586", }, }, { category: "product_version", name: "procps-devel-3.3.15-7.7.26.i586", product: { name: "procps-devel-3.3.15-7.7.26.i586", product_id: "procps-devel-3.3.15-7.7.26.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libprocps7-3.3.15-7.7.26.ppc64le", product: { name: "libprocps7-3.3.15-7.7.26.ppc64le", product_id: "libprocps7-3.3.15-7.7.26.ppc64le", }, }, { category: "product_version", name: "procps-3.3.15-7.7.26.ppc64le", product: { name: "procps-3.3.15-7.7.26.ppc64le", product_id: "procps-3.3.15-7.7.26.ppc64le", }, }, { category: "product_version", name: "procps-devel-3.3.15-7.7.26.ppc64le", product: { name: "procps-devel-3.3.15-7.7.26.ppc64le", product_id: "procps-devel-3.3.15-7.7.26.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libprocps7-3.3.15-7.7.26.s390x", product: { name: "libprocps7-3.3.15-7.7.26.s390x", product_id: "libprocps7-3.3.15-7.7.26.s390x", }, }, { category: "product_version", name: "procps-3.3.15-7.7.26.s390x", product: { name: "procps-3.3.15-7.7.26.s390x", product_id: "procps-3.3.15-7.7.26.s390x", }, }, { category: "product_version", name: "procps-devel-3.3.15-7.7.26.s390x", product: { name: "procps-devel-3.3.15-7.7.26.s390x", product_id: "procps-devel-3.3.15-7.7.26.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libprocps7-3.3.15-7.7.26.x86_64", product: { name: "libprocps7-3.3.15-7.7.26.x86_64", product_id: "libprocps7-3.3.15-7.7.26.x86_64", }, }, { category: "product_version", name: "procps-3.3.15-7.7.26.x86_64", product: { name: "procps-3.3.15-7.7.26.x86_64", product_id: "procps-3.3.15-7.7.26.x86_64", }, }, { category: "product_version", name: "procps-devel-3.3.15-7.7.26.x86_64", product: { name: "procps-devel-3.3.15-7.7.26.x86_64", product_id: "procps-devel-3.3.15-7.7.26.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-7.7.26.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", }, product_reference: "libprocps7-3.3.15-7.7.26.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-7.7.26.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", }, product_reference: "libprocps7-3.3.15-7.7.26.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-7.7.26.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", }, product_reference: "libprocps7-3.3.15-7.7.26.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-7.7.26.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", }, product_reference: "libprocps7-3.3.15-7.7.26.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-7.7.26.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", }, product_reference: "procps-3.3.15-7.7.26.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-7.7.26.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", }, product_reference: "procps-3.3.15-7.7.26.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-7.7.26.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", }, product_reference: "procps-3.3.15-7.7.26.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-7.7.26.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", }, product_reference: "procps-3.3.15-7.7.26.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-7.7.26.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", }, product_reference: "procps-devel-3.3.15-7.7.26.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-7.7.26.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", }, product_reference: "procps-devel-3.3.15-7.7.26.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-7.7.26.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", }, product_reference: "procps-devel-3.3.15-7.7.26.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-7.7.26.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", }, product_reference: "procps-devel-3.3.15-7.7.26.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-7.7.26.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", }, product_reference: "libprocps7-3.3.15-7.7.26.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-7.7.26.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", }, product_reference: "libprocps7-3.3.15-7.7.26.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-7.7.26.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", }, product_reference: "libprocps7-3.3.15-7.7.26.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libprocps7-3.3.15-7.7.26.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", }, product_reference: "libprocps7-3.3.15-7.7.26.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-7.7.26.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", }, product_reference: "procps-3.3.15-7.7.26.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-7.7.26.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", }, product_reference: "procps-3.3.15-7.7.26.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-7.7.26.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", }, product_reference: "procps-3.3.15-7.7.26.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "procps-3.3.15-7.7.26.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", }, product_reference: "procps-3.3.15-7.7.26.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-7.7.26.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", }, product_reference: "procps-devel-3.3.15-7.7.26.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-7.7.26.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", }, product_reference: "procps-devel-3.3.15-7.7.26.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-7.7.26.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", }, product_reference: "procps-devel-3.3.15-7.7.26.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "procps-devel-3.3.15-7.7.26.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", }, product_reference: "procps-devel-3.3.15-7.7.26.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1122", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1122", url: "https://www.suse.com/security/cve/CVE-2018-1122", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1122", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1122", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1122", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1122", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1122", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1122", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-21T14:04:59Z", details: "important", }, ], title: "CVE-2018-1122", }, { cve: "CVE-2018-1123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1123", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1123", url: "https://www.suse.com/security/cve/CVE-2018-1123", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1123", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1123", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1123", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1123", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1123", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1123", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-21T14:04:59Z", details: "important", }, ], title: "CVE-2018-1123", }, { cve: "CVE-2018-1124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1124", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1124", url: "https://www.suse.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1124", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1124", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1124", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1124", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1124", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1124", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-21T14:04:59Z", details: "important", }, ], title: "CVE-2018-1124", }, { cve: "CVE-2018-1125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1125", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1125", url: "https://www.suse.com/security/cve/CVE-2018-1125", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1125", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1125", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1125", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1125", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1125", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1125", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-21T14:04:59Z", details: "important", }, ], title: "CVE-2018-1125", }, { cve: "CVE-2018-1126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1126", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1126", url: "https://www.suse.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1126", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1126", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1126", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1126", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1126", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1126", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:procps-devel-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libprocps7-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-3.3.15-7.7.26.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.s390x", "SUSE Linux Enterprise Module for Basesystem 15:procps-devel-3.3.15-7.7.26.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-21T14:04:59Z", details: "important", }, ], title: "CVE-2018-1126", }, ], }
suse-su-2018:2042-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for procps", title: "Title of the patch", }, { category: "description", text: "This update for procps fixes the following security issues:\n\n- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top\n with HOME unset in an attacker-controlled directory, the attacker could have\n achieved privilege escalation by exploiting one of several vulnerabilities in\n the config_file() function (bsc#1092100).\n- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.\n Inbuilt protection in ps maped a guard page at the end of the overflowed\n buffer, ensuring that the impact of this flaw is limited to a crash (temporary\n denial of service) (bsc#1092100).\n- CVE-2018-1124: Prevent multiple integer overflows leading to a heap\n corruption in file2strvec function. This allowed a privilege escalation for a\n local attacker who can create entries in procfs by starting processes, which\n could result in crashes or arbitrary code execution in proc utilities run by\n other users (bsc#1092100).\n- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was\n mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).\n- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent\n truncation/integer overflow issues (bsc#1092100).\n", title: "Description of the patch", }, { category: "details", text: "slessp4-procps-13699", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2042-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2042-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182042-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2042-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html", }, { category: "self", summary: "SUSE Bug 1092100", url: "https://bugzilla.suse.com/1092100", }, { category: "self", summary: "SUSE CVE CVE-2018-1122 page", url: "https://www.suse.com/security/cve/CVE-2018-1122/", }, { category: "self", summary: "SUSE CVE CVE-2018-1123 page", url: "https://www.suse.com/security/cve/CVE-2018-1123/", }, { category: "self", summary: "SUSE CVE CVE-2018-1124 page", url: "https://www.suse.com/security/cve/CVE-2018-1124/", }, { category: "self", summary: "SUSE CVE CVE-2018-1125 page", url: "https://www.suse.com/security/cve/CVE-2018-1125/", }, { category: "self", summary: "SUSE CVE CVE-2018-1126 page", url: "https://www.suse.com/security/cve/CVE-2018-1126/", }, ], title: "Security update for procps", tracking: { current_release_date: "2018-07-23T08:58:30Z", generator: { date: "2018-07-23T08:58:30Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2042-1", initial_release_date: "2018-07-23T08:58:30Z", revision_history: [ { date: "2018-07-23T08:58:30Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "procps-3.2.7-152.31.1.i586", product: { name: "procps-3.2.7-152.31.1.i586", product_id: "procps-3.2.7-152.31.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "procps-3.2.7-152.31.1.ia64", product: { name: "procps-3.2.7-152.31.1.ia64", product_id: "procps-3.2.7-152.31.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "procps-3.2.7-152.31.1.ppc64", product: { name: "procps-3.2.7-152.31.1.ppc64", product_id: "procps-3.2.7-152.31.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "procps-3.2.7-152.31.1.s390x", product: { name: "procps-3.2.7-152.31.1.s390x", product_id: "procps-3.2.7-152.31.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "procps-3.2.7-152.31.1.x86_64", product: { name: "procps-3.2.7-152.31.1.x86_64", product_id: "procps-3.2.7-152.31.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4", product: { name: "SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "procps-3.2.7-152.31.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", }, product_reference: "procps-3.2.7-152.31.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.2.7-152.31.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", }, product_reference: "procps-3.2.7-152.31.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.2.7-152.31.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", }, product_reference: "procps-3.2.7-152.31.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.2.7-152.31.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", }, product_reference: "procps-3.2.7-152.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.2.7-152.31.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", }, product_reference: "procps-3.2.7-152.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.2.7-152.31.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", }, product_reference: "procps-3.2.7-152.31.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.2.7-152.31.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", }, product_reference: "procps-3.2.7-152.31.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.2.7-152.31.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", }, product_reference: "procps-3.2.7-152.31.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.2.7-152.31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", }, product_reference: "procps-3.2.7-152.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "procps-3.2.7-152.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", }, product_reference: "procps-3.2.7-152.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1122", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1122", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1122", url: "https://www.suse.com/security/cve/CVE-2018-1122", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1122", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1122", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1122", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1122", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1122", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1122", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-23T08:58:30Z", details: "moderate", }, ], title: "CVE-2018-1122", }, { cve: "CVE-2018-1123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1123", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1123", url: "https://www.suse.com/security/cve/CVE-2018-1123", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1123", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1123", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1123", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1123", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1123", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1123", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-23T08:58:30Z", details: "moderate", }, ], title: "CVE-2018-1123", }, { cve: "CVE-2018-1124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1124", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1124", url: "https://www.suse.com/security/cve/CVE-2018-1124", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1124", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1124", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1124", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1124", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1124", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1124", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-23T08:58:30Z", details: "moderate", }, ], title: "CVE-2018-1124", }, { cve: "CVE-2018-1125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1125", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1125", url: "https://www.suse.com/security/cve/CVE-2018-1125", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1125", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1125", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1125", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1125", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1125", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1125", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-23T08:58:30Z", details: "moderate", }, ], title: "CVE-2018-1125", }, { cve: "CVE-2018-1126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1126", }, ], notes: [ { category: "general", text: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1126", url: "https://www.suse.com/security/cve/CVE-2018-1126", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1126", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092100 for CVE-2018-1126", url: "https://bugzilla.suse.com/1092100", }, { category: "external", summary: "SUSE Bug 1093158 for CVE-2018-1126", url: "https://bugzilla.suse.com/1093158", }, { category: "external", summary: "SUSE Bug 1123135 for CVE-2018-1126", url: "https://bugzilla.suse.com/1123135", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-1126", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1128955 for CVE-2018-1126", url: "https://bugzilla.suse.com/1128955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server 11 SP4:procps-3.2.7-152.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:procps-3.2.7-152.31.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-23T08:58:30Z", details: "moderate", }, ], title: "CVE-2018-1126", }, ], }
ghsa-6m7w-m36x-76pq
Vulnerability from github
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
{ affected: [], aliases: [ "CVE-2018-1124", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-05-23T13:29:00Z", severity: "HIGH", }, details: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", id: "GHSA-6m7w-m36x-76pq", modified: "2022-05-13T01:16:28Z", published: "2022-05-13T01:16:28Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1124", }, { type: "WEB", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { type: "WEB", url: "https://www.exploit-db.com/exploits/44806", }, { type: "WEB", url: "https://www.debian.org/security/2018/dsa-4208", }, { type: "WEB", url: "https://usn.ubuntu.com/3658-2", }, { type: "WEB", url: "https://usn.ubuntu.com/3658-1", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201805-14", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { type: "WEB", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", }, { type: "WEB", url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, { type: "WEB", url: "http://seclists.org/oss-sec/2018/q2/122", }, { type: "WEB", url: "http://www.securityfocus.com/bid/104214", }, { type: "WEB", url: "http://www.securitytracker.com/id/1041057", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
var-201805-0613
Vulnerability from variot
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users. procps-ng Contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Procps-ng Procps is prone to the following security vulnerabilities: 1. A local security-bypass vulnerability 2. A local privilege-escalation vulnerability 3. A local denial-of-service vulnerability 4. Multiple local integer-overflow vulnerabilities 5. A stack-based buffer-overflow vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected application or perform unauthorized actions. Failed exploit attempts will likely cause a denial-of-service condition. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201805-14
https://security.gentoo.org/
Severity: Normal Title: procps: Multiple vulnerabilities Date: May 30, 2018 Bugs: #656022 ID: 201805-14
Synopsis
Multiple vulnerabilities have been found in procps, the worst of which could result in the execution of arbitrary code.
Background
A bunch of small useful utilities that give information about processes using the /proc filesystem.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 sys-process/procps < 3.3.15-r1 >= 3.3.15-r1
Description
Multiple vulnerabilities have been discovered in procps. Please review the CVE identifiers referenced below for details.
Impact
A local attacker could execute arbitrary code, escalate privileges, or cause a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All procps users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-process/procps-3.3.15-r1"
References
[ 1 ] CVE-2018-1120 https://nvd.nist.gov/vuln/detail/CVE-2018-1120 [ 2 ] CVE-2018-1121 https://nvd.nist.gov/vuln/detail/CVE-2018-1121 [ 3 ] CVE-2018-1122 https://nvd.nist.gov/vuln/detail/CVE-2018-1122 [ 4 ] CVE-2018-1123 https://nvd.nist.gov/vuln/detail/CVE-2018-1123 [ 5 ] CVE-2018-1124 https://nvd.nist.gov/vuln/detail/CVE-2018-1124
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201805-14
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201805-0613", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "procps-ng", scope: "lt", trust: 1.8, vendor: "procps ng", version: "3.3.15", }, { model: "enterprise linux workstation", scope: "eq", trust: 1.6, vendor: "redhat", version: "7.0", }, { model: "enterprise linux desktop", scope: "eq", trust: 1.6, vendor: "redhat", version: "6.0", }, { model: "enterprise linux desktop", scope: "eq", trust: 1.6, vendor: "redhat", version: "7.0", }, { model: "enterprise linux", scope: "eq", trust: 1.6, vendor: "redhat", version: "6.0", }, { model: "enterprise linux server", scope: "eq", trust: 1.6, vendor: "redhat", version: "6.0", }, { model: "enterprise linux", scope: "eq", trust: 1.6, vendor: "redhat", version: "7.5", }, { model: "enterprise linux workstation", scope: "eq", trust: 1.6, vendor: "redhat", version: "6.0", }, { model: "enterprise linux", scope: "eq", trust: 1.6, vendor: "redhat", version: "7.0", }, { model: "enterprise linux server", scope: "eq", trust: 1.6, vendor: "redhat", version: "7.0", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "18.04", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "7.0", }, { model: "leap", scope: "eq", trust: 1, vendor: "opensuse", version: "15.1", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "16.04", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "14.04", }, { model: "struxureware data center expert", scope: "lt", trust: 1, vendor: "schneider electric", version: "7.6.0", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "9.0", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "17.10", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "8.0", }, { model: "leap", scope: "eq", trust: 1, vendor: "opensuse", version: "15.0", }, { model: "ubuntu", scope: null, trust: 0.8, vendor: "canonical", version: null, }, { model: "gnu/linux", scope: null, trust: 0.8, vendor: "debian", version: null, }, { model: "enterprise linux", scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: "enterprise linux desktop", scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: "enterprise linux server", scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: "enterprise linux workstation", scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: "enterprise linux", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "enterprise linux", scope: "eq", trust: 0.3, vendor: "redhat", version: "5", }, { model: "procps", scope: "eq", trust: 0.3, vendor: "procps ng", version: "0", }, ], sources: [ { db: "NVD", id: "CVE-2018-1124", }, { db: "CNNVD", id: "CNNVD-201805-789", }, { db: "JVNDB", id: "JVNDB-2018-005228", }, { db: "BID", id: "104214", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:procps-ng_project:procps-ng:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.3.15", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.6.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-1124", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Red Hat", sources: [ { db: "CNNVD", id: "CNNVD-201805-789", }, ], trust: 0.6, }, cve: "CVE-2018-1124", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/severity#", }, "@id": "https://www.variotdbs.pl/ref/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.9, id: "CVE-2018-1124", impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1.9, userInteractionRequired: false, vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, id: "CVE-2018-1124", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 7.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-1124", impactScore: null, integrityImpact: "High", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-1124", trust: 1.8, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201805-789", trust: 0.6, value: "HIGH", }, { author: "VULMON", id: "CVE-2018-1124", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-1124", }, { db: "CNNVD", id: "CNNVD-201805-789", }, { db: "JVNDB", id: "JVNDB-2018-005228", }, { db: "VULMON", id: "CVE-2018-1124", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users. procps-ng Contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Procps-ng Procps is prone to the following security vulnerabilities:\n1. A local security-bypass vulnerability\n2. A local privilege-escalation vulnerability\n3. A local denial-of-service vulnerability\n4. Multiple local integer-overflow vulnerabilities\n5. A stack-based buffer-overflow vulnerability\nAttackers can exploit these issues to execute arbitrary code in the context of the user running the affected application or perform unauthorized actions. Failed exploit attempts will likely cause a denial-of-service condition. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201805-14\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: procps: Multiple vulnerabilities\n Date: May 30, 2018\n Bugs: #656022\n ID: 201805-14\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in procps, the worst of which\ncould result in the execution of arbitrary code. \n\nBackground\n==========\n\nA bunch of small useful utilities that give information about processes\nusing the /proc filesystem. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 sys-process/procps < 3.3.15-r1 >= 3.3.15-r1 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in procps. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA local attacker could execute arbitrary code, escalate privileges, or\ncause a Denial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll procps users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=sys-process/procps-3.3.15-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2018-1120\n https://nvd.nist.gov/vuln/detail/CVE-2018-1120\n[ 2 ] CVE-2018-1121\n https://nvd.nist.gov/vuln/detail/CVE-2018-1121\n[ 3 ] CVE-2018-1122\n https://nvd.nist.gov/vuln/detail/CVE-2018-1122\n[ 4 ] CVE-2018-1123\n https://nvd.nist.gov/vuln/detail/CVE-2018-1123\n[ 5 ] CVE-2018-1124\n https://nvd.nist.gov/vuln/detail/CVE-2018-1124\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201805-14\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2018 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", sources: [ { db: "NVD", id: "CVE-2018-1124", }, { db: "JVNDB", id: "JVNDB-2018-005228", }, { db: "BID", id: "104214", }, { db: "VULMON", id: "CVE-2018-1124", }, { db: "PACKETSTORM", id: "147943", }, ], trust: 2.07, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=44806", trust: 0.1, type: "exploit", }, ], sources: [ { db: "VULMON", id: "CVE-2018-1124", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-1124", trust: 2.9, }, { db: "BID", id: "104214", trust: 2, }, { db: "SECTRACK", id: "1041057", trust: 1.7, }, { db: "EXPLOIT-DB", id: "44806", trust: 1.7, }, { db: "MCAFEE", id: "SB10241", trust: 1.7, }, { db: "JVNDB", id: "JVNDB-2018-005228", trust: 0.8, }, { db: "AUSCERT", id: "ESB-2019.2859", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2018.2456.4", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.2859.2", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2020.4254", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.0001", trust: 0.6, }, { db: "PACKETSTORM", id: "153967", trust: 0.6, }, { db: "PACKETSTORM", id: "153809", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201805-789", trust: 0.6, }, { db: "VULMON", id: "CVE-2018-1124", trust: 0.1, }, { db: "PACKETSTORM", id: "147943", trust: 0.1, }, ], sources: [ { db: "NVD", id: "CVE-2018-1124", }, { db: "CNNVD", id: "CNNVD-201805-789", }, { db: "JVNDB", id: "JVNDB-2018-005228", }, { db: "BID", id: "104214", }, { db: "VULMON", id: "CVE-2018-1124", }, { db: "PACKETSTORM", id: "147943", }, ], }, id: "VAR-201805-0613", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.1196509, }, last_update_date: "2021-12-18T22:07:19.455000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "DSA-4208-1", trust: 0.8, url: "https://www.debian.org/security/2018/dsa-4208", }, { title: "procps", trust: 0.8, url: "https://gitlab.com/procps-ng/procps", }, { title: "RHSA-2018:1700", trust: 0.8, url: "https://access.redhat.com/errata/rhsa-2018:1700", }, { title: "RHSA-2018:1777", trust: 0.8, url: "https://access.redhat.com/errata/rhsa-2018:1777", }, { title: "RHSA-2018:1820", trust: 0.8, url: "https://access.redhat.com/errata/rhsa-2018:1820", }, { title: "USN-3658-1", trust: 0.8, url: "https://usn.ubuntu.com/3658-1/", }, { title: "USN-3658-2", trust: 0.8, url: "https://usn.ubuntu.com/3658-2/", }, { title: "procps-ng Fixes for digital error vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=83673", }, { title: "Red Hat: Important: procps-ng security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20192401 - security advisory", }, { title: "Red Hat: Important: Red Hat Virtualization security, bug fix, and enhancement update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20181820 - security advisory", }, { title: "Red Hat: Important: procps-ng security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20181700 - security advisory", }, { title: "Red Hat: Important: procps-ng security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20191944 - security advisory", }, { title: "Red Hat: Important: procps security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20182267 - security advisory", }, { title: "Red Hat: Important: procps security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20182268 - security advisory", }, { title: "Red Hat: Important: procps security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20181777 - security advisory", }, { title: "Ubuntu Security Notice: procps vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-3658-2", }, { title: "Red Hat: CVE-2018-1124", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2018-1124", }, { title: "Ubuntu Security Notice: procps vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-3658-1", }, { title: "Arch Linux Issues: ", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=cve-2018-1124", }, { title: "Debian CVElist Bug Report Logs: procps: CVE-2018-1122 CVE-2018-1123 CVE-2018-1124 CVE-2018-1125 CVE-2018-1126", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=f5176a4090976ca64e2df1278bd3172b", }, { title: "Debian Security Advisories: DSA-4208-1 procps -- security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=58a59a2b26fe7d48fb944473493eb87a", }, { title: "Amazon Linux 2: ALAS2-2018-1031", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=alas2-2018-1031", }, { title: "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - April 2018", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=c0bb087d513b6ab7ce4efb0405158613", }, { title: "Oracle Linux Bulletins: Oracle Linux Bulletin - April 2018", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=ae57a14ec914f60b7203332a77613077", }, { title: "rhel-centos-ec2-vuls", trust: 0.1, url: "https://github.com/riboseinc/rhel-centos-ec2-vuls ", }, { title: "core-kit", trust: 0.1, url: "https://github.com/funtoo/core-kit ", }, ], sources: [ { db: "CNNVD", id: "CNNVD-201805-789", }, { db: "JVNDB", id: "JVNDB-2018-005228", }, { db: "VULMON", id: "CVE-2018-1124", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-190", trust: 1.8, }, { problemtype: "CWE-787", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2018-1124", }, { db: "JVNDB", id: "JVNDB-2018-005228", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.8, url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { trust: 2.4, url: "https://access.redhat.com/errata/rhsa-2019:2401", }, { trust: 2.3, url: "http://www.securityfocus.com/bid/104214", }, { trust: 2.3, url: "https://access.redhat.com/errata/rhsa-2019:1944", }, { trust: 1.8, url: "https://www.exploit-db.com/exploits/44806/", }, { trust: 1.8, url: "https://usn.ubuntu.com/3658-2/", }, { trust: 1.8, url: "https://security.gentoo.org/glsa/201805-14", }, { trust: 1.7, url: "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2018-1124", }, { trust: 1.7, url: "http://seclists.org/oss-sec/2018/q2/122", }, { trust: 1.7, url: "https://www.debian.org/security/2018/dsa-4208", }, { trust: 1.7, url: "https://usn.ubuntu.com/3658-1/", }, { trust: 1.7, url: "https://access.redhat.com/errata/rhsa-2018:1700", }, { trust: 1.7, url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { trust: 1.7, url: "https://access.redhat.com/errata/rhsa-2018:1777", }, { trust: 1.7, url: "https://access.redhat.com/errata/rhsa-2018:1820", }, { trust: 1.7, url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10241", }, { trust: 1.7, url: "http://www.securitytracker.com/id/1041057", }, { trust: 1.7, url: "https://access.redhat.com/errata/rhsa-2018:2268", }, { trust: 1.7, url: "https://access.redhat.com/errata/rhsa-2018:2267", }, { trust: 1.7, url: "https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0", }, { trust: 1.7, url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { trust: 1.7, url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, { trust: 0.9, url: "https://nvd.nist.gov/vuln/detail/cve-2018-1124", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1124", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192730-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182451-2/", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190450-1/", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182451-1/", }, { trust: 0.6, url: "http://www.ibm.com/support/docview.wss?uid=ibm10874468", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.2859/", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/153967/red-hat-security-advisory-2019-2401-01.html", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/153809/red-hat-security-advisory-2019-1944-01.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.0001/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2018.2456.4/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.2859.2/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2020.4254/", }, { trust: 0.3, url: "https://gitlab.com/procps-ng/procps", }, { trust: 0.3, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575465", }, { trust: 0.3, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575466", }, { trust: 0.3, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575473", }, { trust: 0.3, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575474", }, { trust: 0.3, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575852", }, { trust: 0.3, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1575853", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2018-1121", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2018-1122", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2018-1123", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2018-1124", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2018-1125", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2018-1126", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/787.html", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/190.html", }, { trust: 0.1, url: "https://tools.cisco.com/security/center/viewalert.x?alertid=57956", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-1122", }, { trust: 0.1, url: "https://bugs.gentoo.org.", }, { trust: 0.1, url: "https://security.gentoo.org/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-1123", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-1121", }, { trust: 0.1, url: "https://creativecommons.org/licenses/by-sa/2.5", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-1120", }, ], sources: [ { db: "NVD", id: "CVE-2018-1124", }, { db: "CNNVD", id: "CNNVD-201805-789", }, { db: "JVNDB", id: "JVNDB-2018-005228", }, { db: "BID", id: "104214", }, { db: "VULMON", id: "CVE-2018-1124", }, { db: "PACKETSTORM", id: "147943", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "NVD", id: "CVE-2018-1124", }, { db: "CNNVD", id: "CNNVD-201805-789", }, { db: "JVNDB", id: "JVNDB-2018-005228", }, { db: "BID", id: "104214", }, { db: "VULMON", id: "CVE-2018-1124", }, { db: "PACKETSTORM", id: "147943", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-05-23T13:29:00", db: "NVD", id: "CVE-2018-1124", }, { date: "2018-05-24T00:00:00", db: "CNNVD", id: "CNNVD-201805-789", }, { date: "2018-07-10T00:00:00", db: "JVNDB", id: "JVNDB-2018-005228", }, { date: "2018-05-17T00:00:00", db: "BID", id: "104214", }, { date: "2018-05-23T00:00:00", db: "VULMON", id: "CVE-2018-1124", }, { date: "2018-05-30T19:59:39", db: "PACKETSTORM", id: "147943", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-09-09T14:58:00", db: "NVD", id: "CVE-2018-1124", }, { date: "2021-01-04T00:00:00", db: "CNNVD", id: "CNNVD-201805-789", }, { date: "2018-07-10T00:00:00", db: "JVNDB", id: "JVNDB-2018-005228", }, { date: "2018-05-17T00:00:00", db: "BID", id: "104214", }, { date: "2020-09-09T00:00:00", db: "VULMON", id: "CVE-2018-1124", }, { date: null, db: "PACKETSTORM", id: "147943", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-201805-789", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "procps-ng Integer overflow vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2018-005228", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-201805-789", }, { db: "BID", id: "104214", }, ], trust: 0.9, }, }
fkie_cve-2018-1124
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
procps-ng_project | procps-ng | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | enterprise_linux | 6.0 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux | 7.5 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 6.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
schneider-electric | struxureware_data_center_expert | * | |
opensuse | leap | 15.0 | |
opensuse | leap | 15.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:procps-ng_project:procps-ng:*:*:*:*:*:*:*:*", matchCriteriaId: "9D3B02AD-4269-4FF0-9E2B-C336F3E56A7B", versionEndExcluding: "3.3.15", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", matchCriteriaId: "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*", matchCriteriaId: "4EB48767-F095-444F-9E05-D9AC345AB803", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", matchCriteriaId: "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", matchCriteriaId: "9BBCD86A-E6C7-4444-9D74-F861084090F0", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", matchCriteriaId: "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*", matchCriteriaId: "6CB56955-1A47-4F6C-A354-8BBAE7534504", versionEndExcluding: "7.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", matchCriteriaId: "F1E78106-58E6-4D59-990F-75DA575BFAD9", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", }, { lang: "es", value: "procps-ng en versiones anteriores a la 3.3.15 es vulnerable a múltiples desbordamientos de enteros que conducen a una corrupción de la memoria dinámica (heap) en la función file2strvec. Esto permite el escalado de privilegios para un atacante local que puede crear entradas en procfs empezando procesos, lo que podría resultar en cierres inesperados o la ejecución de código arbitrario en las utilidades proc ejecutadas por otros usuarios.", }, ], id: "CVE-2018-1124", lastModified: "2024-11-21T03:59:13.937", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.3, impactScore: 5.9, source: "secalert@redhat.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-05-23T13:29:00.263", references: [ { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104214", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041057", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201805-14", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3658-1/", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3658-2/", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/44806/", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104214", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041057", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201805-14", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3658-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3658-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/44806/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-122", }, { lang: "en", value: "CWE-190", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-190", }, { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2018-1124
Vulnerability from gsd
{ GSD: { alias: "CVE-2018-1124", description: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", id: "GSD-2018-1124", references: [ "https://www.suse.com/security/cve/CVE-2018-1124.html", "https://www.debian.org/security/2018/dsa-4208", "https://access.redhat.com/errata/RHSA-2019:2401", "https://access.redhat.com/errata/RHSA-2019:1944", "https://access.redhat.com/errata/RHSA-2018:2268", "https://access.redhat.com/errata/RHSA-2018:2267", "https://access.redhat.com/errata/RHSA-2018:1820", "https://access.redhat.com/errata/RHSA-2018:1777", "https://access.redhat.com/errata/RHSA-2018:1700", "https://ubuntu.com/security/CVE-2018-1124", "https://security.archlinux.org/CVE-2018-1124", "https://linux.oracle.com/cve/CVE-2018-1124.html", "https://packetstormsecurity.com/files/cve/CVE-2018-1124", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-1124", ], details: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", id: "GSD-2018-1124", modified: "2023-12-13T01:22:37.611310Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-1124", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "procps-ng", version: { version_data: [ { version_value: "procps-ng 3.3.15", }, ], }, }, ], }, vendor_name: "[UNKNOWN]", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", }, ], }, impact: { cvss: [ [ { vectorString: "7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-190", }, ], }, { description: [ { lang: "eng", value: "CWE-122", }, ], }, ], }, references: { reference_data: [ { name: "USN-3658-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-1/", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", }, { name: "DSA-4208", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "GLSA-201805-14", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201805-14", }, { name: "44806", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/44806/", }, { name: "RHSA-2018:1777", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "RHSA-2018:2267", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { name: "RHSA-2018:2268", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { name: "RHSA-2018:1700", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { name: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", refsource: "CONFIRM", url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { name: "104214", refsource: "BID", url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", refsource: "MLIST", url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "1041057", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041057", }, { name: "RHSA-2018:1820", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { name: "USN-3658-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-2/", }, { name: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", refsource: "MISC", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "RHSA-2019:1944", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { name: "RHSA-2019:2401", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { name: "openSUSE-SU-2019:2376", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:procps-ng_project:procps-ng:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.3.15", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.6.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-1124", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-787", }, { lang: "en", value: "CWE-190", }, ], }, ], }, references: { reference_data: [ { name: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", refsource: "MISC", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", refsource: "CONFIRM", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "DSA-4208", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "USN-3658-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3658-1/", }, { name: "RHSA-2018:1700", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { name: "104214", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "44806", refsource: "EXPLOIT-DB", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/44806/", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", refsource: "MLIST", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "RHSA-2018:1777", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { name: "USN-3658-2", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3658-2/", }, { name: "RHSA-2018:1820", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", }, { name: "1041057", refsource: "SECTRACK", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041057", }, { name: "RHSA-2018:2268", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { name: "RHSA-2018:2267", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { name: "GLSA-201805-14", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201805-14", }, { name: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { name: "RHSA-2019:1944", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { name: "RHSA-2019:2401", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2401", }, { name: "openSUSE-SU-2019:2376", refsource: "SUSE", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", refsource: "SUSE", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2020-09-09T14:58Z", publishedDate: "2018-05-23T13:29Z", }, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.