[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 721-1] libgc security update



Package        : libgc
Version        : 1:7.1-9.1+deb7u1
CVE ID         : CVE-2016-9427
Debian Bug     : 844771

libgc is vulnerable to integer overflows in multiple places. In some cases,
when asked to allocate a huge quantity of memory, instead of failing the
request, it will return a pointer to a small amount of memory possibly
tricking the application into a buffer overwrite.

For Debian 7 "Wheezy", these problems have been fixed in version
1:7.1-9.1+deb7u1.

We recommend that you upgrade your libgc packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-- 
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/

Attachment: signature.asc
Description: PGP signature


Reply to: