Debian Libgc vulnerabilities
2 known vulnerabilities affecting debian/libgc.
Total CVEs
2
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2016-9427CRITICALCVSS 9.8fixed in libgc 1:7.6.4-0.3 (bookworm)2016
CVE-2016-9427 [CRITICAL] CVE-2016-9427: libgc - Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to ca...
Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.
Scope: local
bookworm: resolved (fixed in 1:7.6.4-0.3)
bullseye: resolved (fixed in 1:7.6.4-0.3)
forky: resolved (fixed in 1:7.6.4-0.3)
sid: resolved (fixed in 1:7.
debian
CVE-2012-2673MEDIUMCVSS 5.0fixed in libgc 1:7.1-9 (bookworm)2012
CVE-2012-2673 [MEDIUM] CVE-2012-2673: libgc - Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions...
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be al
debian