Home / mailings [USN-3197-1] libgc vulnerability
Posted on 15 February 2017
Ubuntu Security--===============8992184707590203701==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature"; boundary="a1QUDc0q7S3U7/Jg"
Content-Disposition: inline
--a1QUDc0q7S3U7/Jg
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
==========================================================================
Ubuntu Security Notice USN-3197-1
February 15, 2017
libgc vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Applications using libgc could be made to crash or run programs as
your login.
Software Description:
- libgc: Boehm-Demers-Weiser garbage collecting storage allocator library
Details:
Kuang-che Wu discovered that multiple integer overflow vulnerabilities
existed in libgc. An attacker could use these to cause a denial of
service (application crash) or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.10:
libgc1c2 1:7.4.2-8ubuntu0.1
Ubuntu 16.04 LTS:
libgc1c2 1:7.4.2-7.3ubuntu0.1
Ubuntu 14.04 LTS:
libgc1c2 1:7.2d-5ubuntu2.1
Ubuntu 12.04 LTS:
libgc1c2 1:7.1-8ubuntu0.12.04.3
After a standard system update you need to restart applications using
libgc to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3197-1
CVE-2016-9427
Package Information:
https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-8ubuntu0.1
https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-7.3ubuntu0.1
https://launchpad.net/ubuntu/+source/libgc/1:7.2d-5ubuntu2.1
https://launchpad.net/ubuntu/+source/libgc/1:7.1-8ubuntu0.12.04.3