CVE-2013-0242
Published: 8 February 2013
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
Notes
Author | Note |
---|---|
sbeattie | infinity is going to roll this into an SRU that he'll push through the ubuntu-security-proposed ppa |
Priority
Status
Package | Release | Status |
---|---|---|
eglibc Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Released
(2.11.1-0ubuntu7.13)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Released
(2.15-0ubuntu10.5)
|
|
quantal |
Released
(2.15-0ubuntu20.2)
|
|
raring |
Released
(2.17-0ubuntu5.1)
|
|
saucy |
Not vulnerable
(2.17-91ubuntu1)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://sourceware.org/git/?p=glibc.git;a=commit;h=a445af0bc722d620afed7683cd320c0e4c7c6059 |
||
glibc Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
saucy |
Does not exist
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://sourceware.org/git/?p=glibc.git;a=commit;h=a445af0bc722d620afed7683cd320c0e4c7c6059 |