CVE-2012-0864

Publication date 23 February 2012

Last updated 24 July 2024


Ubuntu priority

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

Read the notes from the security team

Status

Package Ubuntu Release Status
eglibc 11.10 oneiric
Fixed 2.13-20ubuntu5.1
11.04 natty
Fixed 2.13-0ubuntu13.1
10.10 maverick
Fixed 2.12.1-0ubuntu10.4
10.04 LTS lucid
Fixed 2.11.1-0ubuntu7.10
8.04 LTS hardy Not in release
glibc 11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid Not in release
8.04 LTS hardy
Fixed 2.7-10ubuntu8.1

Notes


jdstrand

proposed patch in upstream bug. Not approved yet

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
glibc

References

Related Ubuntu Security Notices (USN)

    • USN-1396-1
    • GNU C Library vulnerabilities
    • 9 March 2012

Other references