libgtop2 (2.14.5-0ubuntu2) feisty; urgency=low
.
* SECURITY UPDATE: Local arbitrary code execution.
* Add debian/patches/00upstream-proc_map-overflow.patch:
- Fix overflow in glibtop_get_proc_map_s() with very long /proc/maps
entries (user triggerable by creating a process with a large cwd
string).
- Patch taken from upstream CVS.
- Closes: LP#79206
libgtop2 (2.14.5-0ubuntu2) feisty; urgency=low patches/ 00upstream- proc_map- overflow. patch: get_proc_ map_s() with very long /proc/maps
.
* SECURITY UPDATE: Local arbitrary code execution.
* Add debian/
- Fix overflow in glibtop_
entries (user triggerable by creating a process with a large cwd
string).
- Patch taken from upstream CVS.
- Closes: LP#79206