vulnerability

Oracle Linux: CVE-2018-1126: ELSA-2018-1700: procps-ng security update (IMPORTANT) (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 17, 2018
Added
May 24, 2018
Modified
Dec 3, 2025

Description

procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.
A flaw was found where procps-ng provides wrappers for standard C allocators that took `unsigned int` instead of `size_t` parameters. On platforms where these differ (such as x86_64), this could cause integer truncation, leading to undersized regions being returned to callers that could then be overflowed. The only known exploitable vector for this issue is CVE-2018-1124.

Solutions

oracle-linux-upgrade-procpsoracle-linux-upgrade-procps-develoracle-linux-upgrade-procps-ngoracle-linux-upgrade-procps-ng-develoracle-linux-upgrade-procps-ng-i18n
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.