-
libgc (1:7.1-8ubuntu0.12.04.3) precise-security; urgency=medium
* SECURITY UPDATE: multiple integer overflows leading to pointers to
memory zones smaller than requested size.
- d/p/CVE-2016-9427-1.patch: Fix calloc_explicitly_typed in case
of lb*n overflow.
- d/p/CVE-2016-9427-2.patch: Fix malloc routines to prevent size
value wrap-around of lb*n overflow.
- d/p/CVE-2016-9427-3.patch: Fix GC_collect_or_expand to prevent
allocation size value wrap-around
- d/p/CVE-2016-9427-test.patch: add test cases
- CVE-2016-9427
-- Steve Beattie <email address hidden> Mon, 13 Feb 2017 17:25:55 -0800
-
libgc (1:7.1-8ubuntu0.12.04.1) precise-security; urgency=low
* SECURITY UPDATE: multiple integer overflows
- debian/patches/CVE-2012-2673.patch: check for integer overflow in
internal malloc and calloc routines.
- CVE-2012-2673
-- Steve Beattie <email address hidden> Wed, 01 Aug 2012 12:54:10 -0700
-
libgc (1:7.1-8build1) precise; urgency=low
* No-change rebuild against current pkgbinarymangler to fix broken
md5sums. (see LP #875466)
-- Martin Pitt <email address hidden> Wed, 29 Feb 2012 17:58:04 +0100
-
libgc (1:7.1-8) unstable; urgency=low
* Import patch by Thorsten Glaser
* d/p/06-m68k-no-getcontext.diff: new, don’t use getcontext(2)
on m68k because it’s not implemented there (Closes: #624833)
* Import patch by Aaron M. Ucko
* build with GC_THREADS on non-linux platforms as well
* remove *.la files (Closes: #621660)
* update policy version from 3.9.1 to 3.9.2, no changes
-- Ubuntu Archive Auto-Sync <email address hidden> Sun, 29 May 2011 21:45:02 +0000