procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 12.04 | |
ubuntu_linux | eq | 17.10 | |
ubuntu_linux | eq | 18.04 | |
debian_linux | eq | 8.0 | |
debian_linux | eq | 7.0 | |
debian_linux | eq | 9.0 | |
leap | eq | 15.1 | |
procps-ng | lt | 3.3.15 |
lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
seclists.org/oss-sec/2018/q2/122
www.securityfocus.com/bid/104214
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125
lists.debian.org/debian-lts-announce/2018/05/msg00021.html
usn.ubuntu.com/3658-1/
usn.ubuntu.com/3658-3/
www.debian.org/security/2018/dsa-4208
www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt