[ubuntu/trusty-security] libgc 1:7.2d-5ubuntu2.1 (Accepted)

Steve Beattie sbeattie at ubuntu.com
Wed Feb 15 17:57:58 UTC 2017


libgc (1:7.2d-5ubuntu2.1) trusty-security; urgency=medium

  * SECURITY UPDATE: multiple integer overflows leading to pointers to
    memory zones smaller than requested size.
    - d/p/CVE-2016-9427-1.patch: Fix calloc_explicitly_typed in case
      of lb*n overflow.
    - d/p/CVE-2016-9427-2.patch: Fix malloc routines to prevent size
      value wrap-around of lb*n overflow.
    - d/p/CVE-2016-9427-3.patch: Fix GC_collect_or_expand to prevent
      allocation size value wrap-around
    - d/p/CVE-2016-9427-prereq.patch: add/use ROUNDUP_PAGESIZE_IF_MMAP
      macro needed for actual fixes.
    - d/p/CVE-2016-9427-test.patch: add test cases
    - CVE-2016-9427

Date: 2017-02-14 03:46:27.069149+00:00
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
https://launchpad.net/ubuntu/+source/libgc/1:7.2d-5ubuntu2.1
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list