ALT-PU-2022-6123-1
Package libgc updated to version 8.2.2-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
Published: 2016-08-21
BDU:2022-05976
Уязвимость сборщика мусора для C и C++ Boehm-Demers-Weiser GC, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Severity: CRITICAL (9.8)
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: CRITICAL (10.0)
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
References:
Published: 2016-12-12
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2016-9427
Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: CRITICAL (9.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00089.html
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00115.html
- http://www.openwall.com/lists/oss-security/2016/11/18/3
- http://www.securityfocus.com/bid/94407
- https://github.com/ivmai/bdwgc/issues/135
- https://lists.debian.org/debian-lts-announce/2022/03/msg00039.html
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00089.html
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00115.html
- http://www.openwall.com/lists/oss-security/2016/11/18/3
- http://www.securityfocus.com/bid/94407
- https://github.com/ivmai/bdwgc/issues/135
- https://lists.debian.org/debian-lts-announce/2022/03/msg00039.html