CVE-2011-1659
Publication date 8 April 2011
Last updated 24 July 2024
Ubuntu priority
Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.
Status
Package | Ubuntu Release | Status |
---|---|---|
eglibc | 11.10 oneiric |
Not affected
|
11.04 natty |
Fixed 2.13-0ubuntu13.1
|
|
10.10 maverick |
Fixed 2.12.1-0ubuntu10.4
|
|
10.04 LTS lucid |
Fixed 2.11.1-0ubuntu7.10
|
|
9.10 karmic | Ignored end of life | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
glibc | 11.10 oneiric | Not in release |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
9.10 karmic | Not in release | |
8.04 LTS hardy |
Fixed 2.7-10ubuntu8.1
|
|
6.06 LTS dapper | Ignored end of life |
Patch details
Package | Patch details |
---|---|
eglibc | |
glibc |
References
Related Ubuntu Security Notices (USN)
- USN-1396-1
- GNU C Library vulnerabilities
- 9 March 2012