First published: Fri Feb 08 2013(Updated: )
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | =2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.