tags -1 fixed-upstream
The probable fix is at
https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413
The issue is the -C command allocates memory using malloc(length of arg *
size of struct).
In odd situations, you could have a very large arg, the multiplication
ove
Package: procps
Version: 2:4.0.3-1
Severity: important
Tags: security
X-Debbugs-Cc: Debian Security Team
We have a very scant report of a ps buffer overflow security bug.
Under some circumstances, this weakness allows a user who has access to run the
“ps” utility on a machine, the ability to wr
2 matches
Mail list logo