CVE-2018-1125 PUBLISHED

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.

EPSS 0.36% · 58.2th percentile

Risk Scores

EPSS Score
0.36%
58.2th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSprocps0, 1:3.3.9-1ubuntu8, 2:3.3.10-4ubuntu1
Ubuntu:14.04:LTSprocps1:3.3.9-1ubuntu2.1, 1:3.3.9-1ubuntu2.2, 0
Ubuntu:18.04:LTSprocps0, 2:3.3.12-1ubuntu2, 2:3.3.12-3ubuntu1

Timeline

References

Open in Interactive Console →