CVE-2013-0242

Priority
Description
Buffer overflow in the extend_buffers function in the regular expression
matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows
context-dependent attackers to cause a denial of service (memory corruption
and crash) via crafted multibyte characters.
Assigned-to
mdeslaur
Notes
sbeattieinfinity is going to roll this into an SRU that he'll push
through the ubuntu-security-proposed ppa
More Information

Updated: 2020-09-10 02:28:32 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)