CVE-2013-0242
Publication date 8 February 2013
Last updated 24 July 2024
Ubuntu priority
Description
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| eglibc | ||
| glibc | ||
Notes
sbeattie
infinity is going to roll this into an SRU that he'll push through the ubuntu-security-proposed ppa
Patch details
| Package | Patch details |
|---|---|
| eglibc | |
| glibc |
References
Related Ubuntu Security Notices (USN)
- USN-1991-1
- GNU C Library vulnerabilities
- 21 October 2013