User: Password:
|
|
Subscribe / Log in / New account

glibc: denial of service

Package(s):glibc CVE #(s):CVE-2013-0242
Created:April 1, 2013 Updated:June 3, 2013
Description: From the CVE entry:

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

Alerts:
Debian-LTS DLA-165-1 eglibc 2015-03-06
Gentoo 201503-04 glibc 2015-03-08
SUSE SUSE-SU-2014:1128-1 glibc 2014-09-15
SUSE SUSE-SU-2014:1122-1 glibc 2014-09-12
Scientific Linux SLSA-2013:1605-2 glibc 2013-12-03
Oracle ELSA-2013-1605 glibc 2013-11-26
Red Hat RHSA-2013:1605-02 glibc 2013-11-21
Ubuntu USN-1991-1 eglibc 2013-10-21
openSUSE openSUSE-SU-2013:1510-1 glibc 2013-09-30
Fedora FEDORA-2013-4174 glibc 2013-06-02
Mageia MGASA-2013-0141 glibc 2013-05-09
Mandriva MDVSA-2013:163 glibc 2013-05-07
Mandriva MDVSA-2013:162 glibc 2013-05-07
Scientific Linux SL-glib-20130425 glibc 2013-04-25
Oracle ELSA-2013-0769 glibc 2013-04-25
CentOS CESA-2013:0769 glibc 2013-04-24
Red Hat RHSA-2013:0769-01 glibc 2013-04-24
Fedora FEDORA-2013-4100 glibc 2013-03-30

(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds