MDVSA-2012:158 -- Mandriva gcID: oval:org.secpod.oval:def:302968 | Date: (C)2012-11-26 (M)2023-07-28 |
Class: PATCH | Family: unix |
A security issue was identified and fixed in gc: Multiple integer overflows in the GC_generic_malloc and calloc funtions in malloc.c, and the GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected . The updated packages have been patched to correct this issue.
Platform: |
Mandriva Linux 2011.0 |