Vulnerability Description
procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Procps-Ng Project | Procps-Ng | < 3.3.15 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
| Opensuse | Leap | 15.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.htmlMailing ListThird Party Advisory
- http://seclists.org/oss-sec/2018/q2/122Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/104214Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125Issue Tracking
- https://lists.debian.org/debian-lts-announce/2018/05/msg00021.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/3658-1/Third Party Advisory
- https://usn.ubuntu.com/3658-3/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4208Third Party Advisory
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txtExploitThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.htmlMailing ListThird Party Advisory
- http://seclists.org/oss-sec/2018/q2/122Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/104214Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125Issue Tracking
FAQ
What is CVE-2018-1125?
CVE-2018-1125 is a vulnerability with a CVSS score of 7.5 (HIGH). procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compi...
How severe is CVE-2018-1125?
CVE-2018-1125 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1125?
Check the references section above for vendor advisories and patch information. Affected products include: Procps-Ng Project Procps-Ng, Canonical Ubuntu Linux, Debian Debian Linux, Opensuse Leap.