Fedora has issued an advisory on June 16: http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082926.html Links to upstream patches on the RedHat bug: https://bugzilla.redhat.com/show_bug.cgi?id=828878 Other fixes that may be of interest in the Fedora commit diff: http://pkgs.fedoraproject.org/gitweb/?p=gc.git;a=commitdiff;h=16efc896b0ef30b04e91126c54b0f8ee28b00e75
CC: (none) => jani.valimaa
CC: (none) => n54
Whiteboard: (none) => MGA2TOO, MGA1TOO
Assignee: bugsquad => n54
I'm on it
Status: NEW => ASSIGNED
Fixed in Cauldron
Version: Cauldron => 2Whiteboard: MGA2TOO, MGA1TOO => MGA1TOO
CC: jani.valimaa => (none)
Ubuntu has issued an advisory for this on August 28: http://www.ubuntu.com/usn/usn-1546-1/ They have patches for 7.1, which we have in Mageia 1.
Patched packages uploaded for Mageia 1 and Mageia 2. Advisory: ======================== Updated gc packages fix security vulnerability: Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc funtions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected (CVE-2012-2673). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2673 http://www.ubuntu.com/usn/usn-1546-1/ ======================== Updated packages in core/updates_testing: ======================== libgc1-7.1-7.1.mga1 libgc-devel-7.1-7.1.mga1 libgc-static-devel-7.1-7.1.mga1 libgc1-7.2-0.alpha6.3.1.mga2 libgc-devel-7.2-0.alpha6.3.1.mga2 from SRPMS: gc-7.1-7.1.mga1.src.rpm gc-7.2-0.alpha6.3.1.mga2.src.rpm
Assignee: n54 => qa-bugsSeverity: normal => major
Testing complete on Mageia 1 i586 and x86-64. Testing using inkscape under strace, confirming it's using the library.
CC: (none) => davidwhodginsWhiteboard: MGA1TOO => MGA1TOO MGA1-32-OK MGA1-64-OK
Testing complete on Mageia 2 i586 and x86-64. Could someone from the sysadmin team push the srpm gc-7.2-0.alpha6.3.1.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates and the srpm gc-7.1-7.1.mga1.src.rpm from Mageia 1 Core Updates Testing to Core Updates. Advisory: Updated gc packages fix security vulnerability: Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc funtions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected (CVE-2012-2673). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2673 http://www.ubuntu.com/usn/usn-1546-1/ https://bugs.mageia.org/show_bug.cgi?id=6652
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugsWhiteboard: MGA1TOO MGA1-32-OK MGA1-64-OK => MGA1TOO MGA1-32-OK MGA1-64-OK MGA2-32-OK MGA2-64-OK
Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0249
Status: ASSIGNED => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED