CVE-2011-1659

Publication date 8 April 2011

Last updated 24 July 2024


Ubuntu priority

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.

Status

Package Ubuntu Release Status
eglibc 11.10 oneiric
Not affected
11.04 natty
Fixed 2.13-0ubuntu13.1
10.10 maverick
Fixed 2.12.1-0ubuntu10.4
10.04 LTS lucid
Fixed 2.11.1-0ubuntu7.10
9.10 karmic Ignored end of life
8.04 LTS hardy Not in release
6.06 LTS dapper Not in release
glibc 11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid Not in release
9.10 karmic Not in release
8.04 LTS hardy
Fixed 2.7-10ubuntu8.1
6.06 LTS dapper Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
eglibc
glibc

References

Related Ubuntu Security Notices (USN)

    • USN-1396-1
    • GNU C Library vulnerabilities
    • 9 March 2012

Other references