ALAS-2013-245


Amazon Linux 1 Security Advisory: ALAS-2013-245
Advisory Release Date: 2013-11-04 14:53 Pacific
Advisory Updated Date: 2014-09-16 21:53 Pacific
Severity: Medium

Issue Overview:

It was discovered that gc's implementation of the malloc() and calloc() routines did not properly perform parameter sanitization when allocating memory. If an application using gc did not implement application-level validity checks for the malloc() and calloc() routines, a remote attacker could provide specially crafted application-specific input, which, when processed by the application, could lead to an application crash or, potentially, arbitrary code execution with the privileges of the user running the application. (CVE-2012-2673)


Affected Packages:

gc


Issue Correction:
Run yum update gc to update your system.

New Packages:
i686:
    gc-devel-7.1-12.6.amzn1.i686
    gc-7.1-12.6.amzn1.i686
    gc-debuginfo-7.1-12.6.amzn1.i686

src:
    gc-7.1-12.6.amzn1.src

x86_64:
    gc-7.1-12.6.amzn1.x86_64
    gc-debuginfo-7.1-12.6.amzn1.x86_64
    gc-devel-7.1-12.6.amzn1.x86_64