libgc (1:7.4.2-7.3ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: multiple integer overflows leading to pointers to
    memory zones smaller than requested size.
    - d/p/CVE-2016-9427-1.patch: Fix calloc_explicitly_typed in case
      of lb*n overflow.
    - d/p/CVE-2016-9427-2.patch: Fix malloc routines to prevent size
      value wrap-around of lb*n overflow.
    - d/p/CVE-2016-9427-3.patch: Fix GC_collect_or_expand to prevent
      allocation size value wrap-around
    - d/p/CVE-2016-9427-test.patch: add test cases
    - CVE-2016-9427

Date: 2017-02-14 03:46:32.831413+00:00
Changed-By: Steve Beattie <>
Sorry, changesfile not available.
Xenial-changes mailing list
Modify settings or unsubscribe at:

Reply via email to