CVE-2012-3480
Publication date 25 August 2012
Last updated 24 July 2024
Ubuntu priority
Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified “related functions” in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
Status
Package | Ubuntu Release | Status |
---|---|---|
eglibc | 12.04 LTS precise |
Fixed 2.15-0ubuntu10.2
|
11.10 oneiric |
Fixed 2.13-20ubuntu5.2
|
|
11.04 natty |
Fixed 2.13-0ubuntu13.2
|
|
10.04 LTS lucid |
Fixed 2.11.1-0ubuntu7.11
|
|
8.04 LTS hardy | Not in release | |
glibc | 12.04 LTS precise | Not in release |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy |
Fixed 2.7-10ubuntu8.2
|
Notes
References
Related Ubuntu Security Notices (USN)
- USN-1589-2
- GNU C Library regression
- 17 December 2012
- USN-1589-1
- GNU C Library vulnerabilities
- 2 October 2012