CVE-2012-4424
Published: 9 October 2013
Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.
Notes
Author | Note |
---|---|
jdstrand | introduced in http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5358d026c74 |
Priority
Status
Package | Release | Status |
---|---|---|
glibc Launchpad, Ubuntu, Debian |
oneiric |
Does not exist
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
saucy |
Does not exist
|
|
hardy |
Ignored
(end of life)
|
|
lucid |
Does not exist
|
|
natty |
Does not exist
|
|
upstream |
Needs triage
|
|
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. | ||
eglibc Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Released
(2.11.1-0ubuntu7.13)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Released
(2.15-0ubuntu10.5)
|
|
quantal |
Released
(2.15-0ubuntu20.2)
|
|
raring |
Released
(2.17-0ubuntu5.1)
|
|
saucy |
Released
(2.17-93ubuntu2)
|
|
upstream |
Needs triage
|
|
Patches: upstream: https://sourceware.org/git/?p=glibc.git;a=commit;h=1326ba1af22068db9488c2328bdaf852b8a93dcf (backporting) upstream: https://sourceware.org/git/?p=glibc.git;a=commit;h=141f3a77fe4f1b59b0afa9bf6909cd2000448883 |
||
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. |