Описание
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1:7.1-9 |
hardy | released | 1:6.8-1.1ubuntu0.1 |
lucid | released | 1:6.8-1.2ubuntu1.1 |
natty | released | 1:6.8-1.2ubuntu3.2 |
oneiric | released | 1:7.1-8ubuntu0.11.10.1 |
precise | released | 1:7.1-8ubuntu0.12.04.1 |
upstream | needs-triage |
Показывать по
5 Medium
CVSS2
Связанные уязвимости
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc ...
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
5 Medium
CVSS2