CVE-2013-0242
Publication date 8 February 2013
Last updated 24 July 2024
Ubuntu priority
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
Status
Package | Ubuntu Release | Status |
---|---|---|
eglibc | ||
glibc | ||
Notes
sbeattie
infinity is going to roll this into an SRU that he'll push through the ubuntu-security-proposed ppa
Patch details
Package | Patch details |
---|---|
eglibc | |
glibc |
References
Related Ubuntu Security Notices (USN)
- USN-1991-1
- GNU C Library vulnerabilities
- 21 October 2013