First published: Wed Jul 25 2012(Updated: )
Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Bionic |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2674 is rated as a medium severity vulnerability due to its potential for memory-related attacks.
To mitigate CVE-2012-2674, ensure that you update to the latest version of Bionic that addresses this vulnerability.
CVE-2012-2674 affects devices running Android that utilize the Bionic C library.
CVE-2012-2674 can facilitate memory-related attacks such as buffer overflows.
The functions chk_malloc, leak_malloc, and leak_memalign in Bionic's malloc_debug_leak.c are vulnerable in CVE-2012-2674.