Copied from
ubuntu xenial in
Private PPA for Ubuntu Security Team
by Marc Deslauriers
Changelog
procps (2:3.3.10-4ubuntu2.4) xenial-security; urgency=medium
* SECURITY UPDATE: top configuration file read from current directory
- debian/patches/CVE-2018-1122.patch: do not default to the cwd in
top/top.c.
- CVE-2018-1122
* SECURITY UPDATE: ps output buffer overflow
- debian/patches/CVE-2018-1123.patch: check sizes in ps/output.c.
- CVE-2018-1123
* SECURITY UPDATE: integer overflow in file2strvec()
- debian/patches/CVE-2018-1124.patch: prevent overflow in
proc/readproc.c.
- CVE-2018-1124
* SECURITY UPDATE: stack overflow in pgrep
- debian/patches/CVE-2018-1125.patch: check length in pgrep.c.
- CVE-2018-1125
* SECURITY UPDATE: truncated sizes and possible integer overflow
- debian/patches/CVE-2018-1126.patch: use size_t, not unsigned int in
proc/alloc.*.
- CVE-2018-1126
-- Marc Deslauriers <email address hidden> Mon, 14 May 2018 08:05:23 -0400