[USN-3197-1] libgc vulnerability

Steve Beattie steve.beattie at canonical.com
Wed Feb 15 18:48:34 UTC 2017

Ubuntu Security Notice USN-3197-1
February 15, 2017

libgc vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS


Applications using libgc could be made to crash or run programs as
your login.

Software Description:
- libgc: Boehm-Demers-Weiser garbage collecting storage allocator library


Kuang-che Wu discovered that multiple integer overflow vulnerabilities
existed in libgc. An attacker could use these to cause a denial of
service (application crash) or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
  libgc1c2                        1:7.4.2-8ubuntu0.1

Ubuntu 16.04 LTS:
  libgc1c2                        1:7.4.2-7.3ubuntu0.1

Ubuntu 14.04 LTS:
  libgc1c2                        1:7.2d-5ubuntu2.1

Ubuntu 12.04 LTS:
  libgc1c2                        1:7.1-8ubuntu0.12.04.3

After a standard system update you need to restart applications using
libgc to make all the necessary changes.


Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170215/19c60ddc/attachment.sig>

More information about the ubuntu-security-announce mailing list