CVE-2018-1125

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
redhatCNA
4.4 MEDIUM
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 59%
VendorProductVersion
procps-ng_projectprocps-ng
𝑥
< 3.3.15
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
canonicalubuntu_linux
18.04
debiandebian_linux
7.0
debiandebian_linux
8.0
debiandebian_linux
9.0
opensuseleap
15.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
procps
bullseye
2:3.3.17-5
fixed
bookworm
2:4.0.2-3
fixed
sid
2:4.0.4-6
fixed
trixie
2:4.0.4-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
procps
bionic
Fixed 2:3.3.12-3ubuntu1.1
released
artful
Fixed 2:3.3.12-1ubuntu2.1
released
xenial
Fixed 2:3.3.10-4ubuntu2.4
released
trusty
Fixed 1:3.3.9-1ubuntu2.3
released