[USN-3197-1] libgc vulnerability
Steve Beattie
steve.beattie at canonical.com
Wed Feb 15 18:48:34 UTC 2017
==========================================================================
Ubuntu Security Notice USN-3197-1
February 15, 2017
libgc vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Applications using libgc could be made to crash or run programs as
your login.
Software Description:
- libgc: Boehm-Demers-Weiser garbage collecting storage allocator library
Details:
Kuang-che Wu discovered that multiple integer overflow vulnerabilities
existed in libgc. An attacker could use these to cause a denial of
service (application crash) or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.10:
libgc1c2 1:7.4.2-8ubuntu0.1
Ubuntu 16.04 LTS:
libgc1c2 1:7.4.2-7.3ubuntu0.1
Ubuntu 14.04 LTS:
libgc1c2 1:7.2d-5ubuntu2.1
Ubuntu 12.04 LTS:
libgc1c2 1:7.1-8ubuntu0.12.04.3
After a standard system update you need to restart applications using
libgc to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3197-1
CVE-2016-9427
Package Information:
https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-8ubuntu0.1
https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-7.3ubuntu0.1
https://launchpad.net/ubuntu/+source/libgc/1:7.2d-5ubuntu2.1
https://launchpad.net/ubuntu/+source/libgc/1:7.1-8ubuntu0.12.04.3
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170215/19c60ddc/attachment.sig>
More information about the ubuntu-security-announce
mailing list