CVE-2013-0242

Priority
Description
Buffer overflow in the extend_buffers function in the regular expression
matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows
context-dependent attackers to cause a denial of service (memory corruption
and crash) via crafted multibyte characters.
Assigned-to
mdeslaur
Notes
sbeattieinfinity is going to roll this into an SRU that he'll push
through the ubuntu-security-proposed ppa
More Information

Updated: 2019-12-05 21:02:11 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)