CVE-2012-4412
Published: 9 October 2013
Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
Priority
Status
Package | Release | Status |
---|---|---|
eglibc Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Released
(2.11.1-0ubuntu7.13)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Released
(2.15-0ubuntu10.5)
|
|
quantal |
Released
(2.15-0ubuntu20.2)
|
|
raring |
Released
(2.17-0ubuntu5.1)
|
|
saucy |
Released
(2.17-93ubuntu2)
|
|
upstream |
Needs triage
|
|
Patches: upstream: https://sourceware.org/git/?p=glibc.git;a=commit;h=1326ba1af22068db9488c2328bdaf852b8a93dcf (backporting) upstream: https://sourceware.org/git/?p=glibc.git;a=commit;h=303e567a8062200dc06acde7c76fc34679f08d8f |
||
glibc Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
saucy |
Does not exist
|
|
upstream |
Needs triage
|