Lucene search

K
redhatcveRedhat.comRH:CVE-2018-1125
HistoryMay 18, 2018 - 5:21 a.m.

CVE-2018-1125

2018-05-1805:21:33
redhat.com
access.redhat.com
8

0.005 Low

EPSS

Percentile

75.6%

If a process inspected by pgrep has an argument longer than INT_MAX bytes, “int bytes” could wrap around back to a large positive int (rather than approaching zero), leading to a stack buffer overflow via strncat().

Mitigation

The procps suite on Red Hat Enterprise Linux is built with FORTIFY, which limits the impact of this stack overflow (and others like it) to a crash.