Описание
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2.17-91ubuntu1 |
hardy | DNE | |
lucid | released | 2.11.1-0ubuntu7.13 |
oneiric | ignored | end of life |
precise | released | 2.15-0ubuntu10.5 |
quantal | released | 2.15-0ubuntu20.2 |
raring | released | 2.17-0ubuntu5.1 |
saucy | not-affected | 2.17-91ubuntu1 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | ignored | end of life |
lucid | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
raring | DNE | |
saucy | DNE | |
upstream | needs-triage |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
Buffer overflow in the extend_buffers function in the regular expressi ...
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
EPSS
5 Medium
CVSS2