Home / mailingsPDF  

[USN-3197-1] libgc vulnerability

Posted on 15 February 2017
Ubuntu Security

--===============8992184707590203701==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature"; boundary="a1QUDc0q7S3U7/Jg"
Content-Disposition: inline


--a1QUDc0q7S3U7/Jg
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3197-1
February 15, 2017

libgc vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Applications using libgc could be made to crash or run programs as
your login.

Software Description:
- libgc: Boehm-Demers-Weiser garbage collecting storage allocator library

Details:

Kuang-che Wu discovered that multiple integer overflow vulnerabilities
existed in libgc. An attacker could use these to cause a denial of
service (application crash) or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
libgc1c2 1:7.4.2-8ubuntu0.1

Ubuntu 16.04 LTS:
libgc1c2 1:7.4.2-7.3ubuntu0.1

Ubuntu 14.04 LTS:
libgc1c2 1:7.2d-5ubuntu2.1

Ubuntu 12.04 LTS:
libgc1c2 1:7.1-8ubuntu0.12.04.3

After a standard system update you need to restart applications using
libgc to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3197-1
CVE-2016-9427

Package Information:
https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-8ubuntu0.1
https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-7.3ubuntu0.1
https://launchpad.net/ubuntu/+source/libgc/1:7.2d-5ubuntu2.1
https://launchpad.net/ubuntu/+source/libgc/1:7.1-8ubuntu0.12.04.3

 

TOP