CVE-2012-2673

NameCVE-2012-2673
DescriptionMultiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs677195

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libgc (PTS)buster1:7.6.4-0.4fixed
bullseye1:8.0.4-3fixed
bookworm1:8.2.2-3fixed
sid, trixie1:8.2.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libgcsourcesqueeze1:6.8-2
libgcsource(unstable)1:7.1-9677195

Search for package or bug name: Reporting problems