Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-1500

Опубликовано: 04 нояб. 2013
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2013-1500: gc security update (MODERATE)

[7.1-12]

  • Fix host triplets on x86 (#1014273)
  • Related: CVE-2012-2673

[7.1-11]

  • Add sanity checking for calloc/malloc calls
  • Resolves: CVE-2012-2673

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

gc

7.1-12.el6_4

gc-devel

7.1-12.el6_4

Oracle Linux i686

gc

7.1-12.el6_4

gc-devel

7.1-12.el6_4

Oracle Linux sparc64

gc

7.1-12.el6_4

gc-devel

7.1-12.el6_4

Связанные CVE

Связанные уязвимости

ubuntu
около 13 лет назад

Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.

redhat
около 13 лет назад

Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.

nvd
около 13 лет назад

Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.

debian
около 13 лет назад

Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc ...

github
больше 3 лет назад

Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.