CVE-2023-4016
Published: 2 August 2023
Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
Notes
| Author | Note |
|---|---|
Priority reason: Minor DoS allowing a user to consume memory in an uncommon configuration |
|
| mdeslaur | A user having access to the "ps" utility can consume memory. Having users able to access ps and not consume memory in other ways is a pretty unrealistic scenario. |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
procps Launchpad, Ubuntu, Debian |
bionic |
Released
(2:3.3.12-3ubuntu1.2+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
| focal |
Released
(2:3.3.16-1ubuntu2.4)
|
|
| jammy |
Released
(2:3.3.17-6ubuntu2.1)
|
|
| lunar |
Released
(2:4.0.3-1ubuntu1.23.04.1)
|
|
| mantic |
Released
(2:4.0.3-1ubuntu1.23.10.1)
|
|
| noble |
Not vulnerable
(2:4.0.4-2ubuntu1)
|
|
| trusty |
Needed
|
|
| upstream |
Released
(2:4.0.4-1)
|
|
| xenial |
Released
(2:3.3.10-4ubuntu2.5+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
|
Patches: upstream: https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413 |
||
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 3.3 |
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | Low |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |