=========================================================================Ubuntu Security Notice USN-3197-1
February 15, 2017

libgc vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Applications using libgc could be made to crash or run programs as
your login.

Software Description:
- libgc: Boehm-Demers-Weiser garbage collecting storage allocator library

Details:

Kuang-che Wu discovered that multiple integer overflow vulnerabilities
existed in libgc. An attacker could use these to cause a denial of
service (application crash) or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
  libgc1c2                        1:7.4.2-8ubuntu0.1

Ubuntu 16.04 LTS:
  libgc1c2                        1:7.4.2-7.3ubuntu0.1

Ubuntu 14.04 LTS:
  libgc1c2                        1:7.2d-5ubuntu2.1

Ubuntu 12.04 LTS:
  libgc1c2                        1:7.1-8ubuntu0.12.04.3

After a standard system update you need to restart applications using
libgc to make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-3197-1
  CVE-2016-9427

Package Information:
  https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-8ubuntu0.1
  https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-7.3ubuntu0.1
  https://launchpad.net/ubuntu/+source/libgc/1:7.2d-5ubuntu2.1
  https://launchpad.net/ubuntu/+source/libgc/1:7.1-8ubuntu0.12.04.3

Ubuntu 3197-1: libgc vulnerability

February 15, 2017
Applications using libgc could be made to crash or run programs asyour login.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 16.10: libgc1c2 1:7.4.2-8ubuntu0.1 Ubuntu 16.04 LTS: libgc1c2 1:7.4.2-7.3ubuntu0.1 Ubuntu 14.04 LTS: libgc1c2 1:7.2d-5ubuntu2.1 Ubuntu 12.04 LTS: libgc1c2 1:7.1-8ubuntu0.12.04.3 After a standard system update you need to restart applications using libgc to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-3197-1

CVE-2016-9427

Severity
February 15, 2017

Package Information

https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-8ubuntu0.1 https://launchpad.net/ubuntu/+source/libgc/1:7.4.2-7.3ubuntu0.1 https://launchpad.net/ubuntu/+source/libgc/1:7.2d-5ubuntu2.1 https://launchpad.net/ubuntu/+source/libgc/1:7.1-8ubuntu0.12.04.3

Related News