Ubuntu Security Notice 3197-1 - Kuang-che Wu discovered that multiple integer overflow vulnerabilities existed in libgc. An attacker could use these to cause a denial of service or possibly execute arbitrary code.
9660c57eca69d7e5b5e3f1edab1ac7798f8fe091d546ea992308803cdc972e83
==========================================================================
Ubuntu Security Notice USN-3197-1
February 15, 2017
libgc vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Applications using libgc could be made to crash or run programs as
your login.
Software Description:
- libgc: Boehm-Demers-Weiser garbage collecting storage allocator library
Details:
Kuang-che Wu discovered that multiple integer overflow vulnerabilities
existed in libgc. An attacker could use these to cause a denial of
service (application crash) or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.10:
libgc1c2 1:7.4.2-8ubuntu0.1
Ubuntu 16.04 LTS:
libgc1c2 1:7.4.2-7.3ubuntu0.1
Ubuntu 14.04 LTS:
libgc1c2 1:7.2d-5ubuntu2.1
Ubuntu 12.04 LTS:
libgc1c2 1:7.1-8ubuntu0.12.04.3
After a standard system update you need to restart applications using
libgc to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3197-1
CVE-2016-9427
Package Information:
https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-8ubuntu0.1
https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-7.3ubuntu0.1
https://launchpad.net/ubuntu/+source/libgc/1:7.2d-5ubuntu2.1
https://launchpad.net/ubuntu/+source/libgc/1:7.1-8ubuntu0.12.04.3