[ubuntu/trusty-security] libgc 1:7.2d-5ubuntu2.1 (Accepted)
Steve Beattie
sbeattie at ubuntu.com
Wed Feb 15 17:57:58 UTC 2017
libgc (1:7.2d-5ubuntu2.1) trusty-security; urgency=medium
* SECURITY UPDATE: multiple integer overflows leading to pointers to
memory zones smaller than requested size.
- d/p/CVE-2016-9427-1.patch: Fix calloc_explicitly_typed in case
of lb*n overflow.
- d/p/CVE-2016-9427-2.patch: Fix malloc routines to prevent size
value wrap-around of lb*n overflow.
- d/p/CVE-2016-9427-3.patch: Fix GC_collect_or_expand to prevent
allocation size value wrap-around
- d/p/CVE-2016-9427-prereq.patch: add/use ROUNDUP_PAGESIZE_IF_MMAP
macro needed for actual fixes.
- d/p/CVE-2016-9427-test.patch: add test cases
- CVE-2016-9427
Date: 2017-02-14 03:46:27.069149+00:00
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
https://launchpad.net/ubuntu/+source/libgc/1:7.2d-5ubuntu2.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list