USN-1546-1: libgc vulnerability
28 August 2012
Applications using libgc could be made to crash or run arbitrary programs as your login.
Releases
Packages
- libgc - Boehm-Demers-Weiser garbage collecting storage allocator library
Details
It was discovered that multiple integer overflows existed in the
malloc and calloc implementations in the Boehm-Demers-Weiser garbage
collecting memory allocator (libgc). These could allow an attacker
to cause a denial of service or possibly execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 8.04
Ubuntu 12.04
Ubuntu 11.10
Ubuntu 11.04
Ubuntu 10.04
In general, a standard system update will make all the necessary changes.