[SECURITY] [DLA 721-1] libgc security update

Type debian
Reporter Debian
Modified 2016-11-25T09:54:47


Package : libgc Version : 1:7.1-9.1+deb7u1 CVE ID : CVE-2016-9427 Debian Bug : 844771

libgc is vulnerable to integer overflows in multiple places. In some cases, when asked to allocate a huge quantity of memory, instead of failing the request, it will return a pointer to a small amount of memory possibly tricking the application into a buffer overwrite.

For Debian 7 "Wheezy", these problems have been fixed in version 1:7.1-9.1+deb7u1.

We recommend that you upgrade your libgc packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

-- Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html Learn to master Debian: http://debian-handbook.info/get/