CVE-2011-1071
08.04.2011, 15:17
The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | eglibc | * |
gnu | glibc | 𝑥 ≤ 2.12.1 |
gnu | glibc | 1.00 |
gnu | glibc | 1.01 |
gnu | glibc | 1.02 |
gnu | glibc | 1.03 |
gnu | glibc | 1.04 |
gnu | glibc | 1.05 |
gnu | glibc | 1.06 |
gnu | glibc | 1.07 |
gnu | glibc | 1.08 |
gnu | glibc | 1.09 |
gnu | glibc | 1.09.1 |
gnu | glibc | 2.0 |
gnu | glibc | 2.0.1 |
gnu | glibc | 2.0.2 |
gnu | glibc | 2.0.3 |
gnu | glibc | 2.0.4 |
gnu | glibc | 2.0.5 |
gnu | glibc | 2.0.6 |
gnu | glibc | 2.1 |
gnu | glibc | 2.1.1 |
gnu | glibc | 2.1.1.6 |
gnu | glibc | 2.1.2 |
gnu | glibc | 2.1.3 |
gnu | glibc | 2.1.3.10 |
gnu | glibc | 2.1.9 |
gnu | glibc | 2.2 |
gnu | glibc | 2.2.1 |
gnu | glibc | 2.2.2 |
gnu | glibc | 2.2.3 |
gnu | glibc | 2.2.4 |
gnu | glibc | 2.2.5 |
gnu | glibc | 2.3 |
gnu | glibc | 2.3.1 |
gnu | glibc | 2.3.2 |
gnu | glibc | 2.3.3 |
gnu | glibc | 2.3.4 |
gnu | glibc | 2.3.5 |
gnu | glibc | 2.3.6 |
gnu | glibc | 2.3.10 |
gnu | glibc | 2.4 |
gnu | glibc | 2.5 |
gnu | glibc | 2.5.1 |
gnu | glibc | 2.6 |
gnu | glibc | 2.6.1 |
gnu | glibc | 2.7 |
gnu | glibc | 2.8 |
gnu | glibc | 2.9 |
gnu | glibc | 2.10 |
gnu | glibc | 2.10.1 |
gnu | glibc | 2.10.2 |
gnu | glibc | 2.11 |
gnu | glibc | 2.11.1 |
gnu | glibc | 2.11.2 |
gnu | glibc | 2.11.3 |
gnu | glibc | 2.12.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References