[ubuntu/trusty-updates] procps 1:3.3.9-1ubuntu2.3 (Accepted)

Ubuntu Archive Robot cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Wed May 23 15:28:13 UTC 2018


procps (1:3.3.9-1ubuntu2.3) trusty-security; urgency=medium

  * SECURITY UPDATE: top configuration file read from current directory
    - debian/patches/CVE-2018-1122.patch: do not default to the cwd in
      top/top.c.
    - CVE-2018-1122
  * SECURITY UPDATE: ps output buffer overflow
    - debian/patches/CVE-2018-1123.patch: check sizes in ps/output.c.
    - CVE-2018-1123
  * SECURITY UPDATE: integer overflow in file2strvec()
    - debian/patches/CVE-2018-1124.patch: prevent overflow in
      proc/readproc.c.
    - CVE-2018-1124
  * SECURITY UPDATE: stack overflow in pgrep
    - debian/patches/CVE-2018-1125.patch: check length in pgrep.c.
    - CVE-2018-1125
  * SECURITY UPDATE: truncated sizes and possible integer overflow
    - debian/patches/CVE-2018-1126.patch: use size_t, not unsigned int in
      proc/alloc.*.
    - CVE-2018-1126
  * debian/patches/pmap_new_kernel.patch: fix compatibility with newer
    kernels.

Date: 2018-05-14 12:40:23.006203+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/procps/1:3.3.9-1ubuntu2.3
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list