CVE-2023-4016
Published: 2 August 2023
Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
Notes
Author | Note |
---|---|
Priority reason: Minor DoS allowing a user to consume memory in an uncommon configuration |
|
mdeslaur | A user having access to the "ps" utility can consume memory. Having users able to access ps and not consume memory in other ways is a pretty unrealistic scenario. |
Priority
Status
Package | Release | Status |
---|---|---|
procps Launchpad, Ubuntu, Debian |
bionic |
Released
(2:3.3.12-3ubuntu1.2+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
focal |
Released
(2:3.3.16-1ubuntu2.4)
|
|
jammy |
Released
(2:3.3.17-6ubuntu2.1)
|
|
lunar |
Released
(2:4.0.3-1ubuntu1.23.04.1)
|
|
mantic |
Released
(2:4.0.3-1ubuntu1.23.10.1)
|
|
trusty |
Needed
|
|
upstream |
Released
(2:4.0.4-1)
|
|
xenial |
Released
(2:3.3.10-4ubuntu2.5+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
Patches: upstream: https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.3 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |