|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for gc RHSA-2013:1500-01|
|Summary:||The remote host is missing an update for the 'gc'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'gc'
package(s) announced via the referenced advisory.
gc is a Boehm-Demers-Weiser conservative garbage collector for C and C++.
It was discovered that gc's implementation of the malloc() and calloc()
routines did not properly perform parameter sanitization when allocating
memory. If an application using gc did not implement application-level
validity checks for the malloc() and calloc() routines, a remote attacker
could provide specially crafted application-specific input, which, when
processed by the application, could lead to an application crash or,
potentially, arbitrary code execution with the privileges of the user
running the application. (CVE-2012-2673)
Users of gc are advised to upgrade to these updated packages, which contain
backported patches to correct this issue. Applications using gc must be
restarted for the update to take effect.
gc on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-2673|
BugTraq ID: 54227
RedHat Security Advisories: RHSA-2013:1500
RedHat Security Advisories: RHSA-2014:0149
RedHat Security Advisories: RHSA-2014:0150
|Copyright||Copyright (c) 2013 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.