CVE-2010-2947

Publication date 24 August 2010

Last updated 24 July 2024


Ubuntu priority

Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a string that is inconsistent with the expected number of fields.

Status

Package Ubuntu Release Status
libhx 10.04 LTS lucid
Fixed 3.2-1ubuntu0.1
9.10 karmic
Fixed 2.9-3ubuntu0.1
9.04 jaunty
Fixed 1.28-1ubuntu0.1
8.04 LTS hardy
Fixed 1.10.2-2ubuntu0.1
6.06 LTS dapper Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libhx

References

Related Ubuntu Security Notices (USN)

    • USN-994-1
    • libHX vulnerability
    • 29 September 2010

Other references