procps-ng vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the procps-ng package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-26.el7
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • L
Out-of-Bounds

*
  • H
Integer Overflow or Wraparound

<0:3.3.10-16.el7_4.1
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-16.el7_4.1
  • H
Integer Overflow or Wraparound

<0:3.3.10-16.el7_4.1
  • H
Integer Overflow or Wraparound

<0:3.3.10-10.el7_3.1
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-10.el7_3.1
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-16.el7_4.1
  • H
Integer Overflow or Wraparound

<0:3.3.10-10.el7_3.1
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-16.el7_4.1
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-16.el7_4.1
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-16.el7_4.1
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-17.el7_5.2
  • H
Integer Overflow or Wraparound

<0:3.3.10-16.el7_4.1
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-26.el7
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-23.el7_6.2
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-16.el7_4.2
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-26.el7
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-26.el7
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-16.el7_4.2
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-17.el7_5.4
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-26.el7
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-26.el7
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-23.el7_6.2
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-23.el7_6.2
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-23.el7_6.2
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:3.3.10-16.el7_4.2
  • L
Stack-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Time-of-check Time-of-use (TOCTOU)

*