ID | CVE-2018-1125 | ||||||
Sažetak | procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash. | ||||||
Reference |
|
||||||
CVSS |
|
||||||
Pristup |
|
||||||
Impact |
|
||||||
CVSS vektor | AV:N/AC:L/Au:N/C:N/I:N/A:P | ||||||
Zadnje važnije ažuriranje | 09-09-2020 - 14:59 | ||||||
Objavljeno | 23-05-2018 - 14:29 |