libgc (1:7.4.2-7.3ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: multiple integer overflows leading to pointers to
    memory zones smaller than requested size.
    - d/p/CVE-2016-9427-1.patch: Fix calloc_explicitly_typed in case
      of lb*n overflow.
    - d/p/CVE-2016-9427-2.patch: Fix malloc routines to prevent size
      value wrap-around of lb*n overflow.
    - d/p/CVE-2016-9427-3.patch: Fix GC_collect_or_expand to prevent
      allocation size value wrap-around
    - d/p/CVE-2016-9427-test.patch: add test cases
    - CVE-2016-9427

Date: 2017-02-14 03:46:32.831413+00:00
Changed-By: Steve Beattie <sbeat...@ubuntu.com>
Signed-By: Ubuntu Archive Robot 
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-7.3ubuntu0.1
Sorry, changesfile not available.
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to