USN-1546-1: libgc vulnerability

Publication date

28 August 2012

Overview

Applications using libgc could be made to crash or run arbitrary programs as your login.


Packages

  • libgc - Boehm-Demers-Weiser garbage collecting storage allocator library

Details

It was discovered that multiple integer overflows existed in the
malloc and calloc implementations in the Boehm-Demers-Weiser garbage
collecting memory allocator (libgc). These could allow an attacker
to cause a denial of service or possibly execute arbitrary code.

It was discovered that multiple integer overflows existed in the
malloc and calloc implementations in the Boehm-Demers-Weiser garbage
collecting memory allocator (libgc). These could allow an attacker
to cause a denial of service or possibly execute arbitrary code.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
8.04 hardy libgc1c2 –  1:6.8-1.1ubuntu0.1
12.04 precise libgc1c2 –  1:7.1-8ubuntu0.12.04.1
11.10 oneiric libgc1c2 –  1:7.1-8ubuntu0.11.10.1
11.04 natty libgc1c2 –  1:6.8-1.2ubuntu3.2
10.04 lucid libgc1c2 –  1:6.8-1.2ubuntu1.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›