Change logs for libgc source package in Precise

  • libgc (1:7.1-8ubuntu0.12.04.3) precise-security; urgency=medium
    
      * SECURITY UPDATE: multiple integer overflows leading to pointers to
        memory zones smaller than requested size.
        - d/p/CVE-2016-9427-1.patch: Fix calloc_explicitly_typed in case
          of lb*n overflow.
        - d/p/CVE-2016-9427-2.patch: Fix malloc routines to prevent size
          value wrap-around of lb*n overflow.
        - d/p/CVE-2016-9427-3.patch: Fix GC_collect_or_expand to prevent
          allocation size value wrap-around
        - d/p/CVE-2016-9427-test.patch: add test cases
        - CVE-2016-9427
    
     -- Steve Beattie <email address hidden>  Mon, 13 Feb 2017 17:25:55 -0800
  • libgc (1:7.1-8ubuntu0.12.04.1) precise-security; urgency=low
    
      * SECURITY UPDATE: multiple integer overflows
        - debian/patches/CVE-2012-2673.patch: check for integer overflow in
          internal malloc and calloc routines.
        - CVE-2012-2673
     -- Steve Beattie <email address hidden>   Wed, 01 Aug 2012 12:54:10 -0700
  • libgc (1:7.1-8build1) precise; urgency=low
    
      * No-change rebuild against current pkgbinarymangler to fix broken
        md5sums. (see LP #875466)
     -- Martin Pitt <email address hidden>   Wed, 29 Feb 2012 17:58:04 +0100
  • libgc (1:7.1-8) unstable; urgency=low
    
      * Import patch by Thorsten Glaser
        * d/p/06-m68k-no-getcontext.diff: new, don’t use getcontext(2)
          on m68k because it’s not implemented there (Closes: #624833)
      * Import patch by Aaron M. Ucko
        * build with GC_THREADS on non-linux platforms as well
      * remove *.la files (Closes: #621660)
      * update policy version from 3.9.1 to 3.9.2, no changes
     -- Ubuntu Archive Auto-Sync <email address hidden>   Sun,  29 May 2011 21:45:02 +0000