ID CVE-2013-4332
Summary Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:x64:*
    cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:x64:*
  • cpe:2.3:a:gnu:glibc:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.12:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.12:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.14:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.09.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.09.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.09.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.09.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.09.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.09.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:x86:*
    cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:x86:*
  • cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:x86:*
    cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:x86:*
  • cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:x86:*
    cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:x86:*
  • cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 13-02-2023 - 04:46)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
redhat via4
advisories
  • bugzilla
    id 1007545
    title CVE-2013-4332 glibc: three integer overflows in memory allocator
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment glibc is earlier than 0:2.5-118.el5_10.2
            oval oval:com.redhat.rhsa:tst:20131411001
          • comment glibc is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022002
        • AND
          • comment glibc-common is earlier than 0:2.5-118.el5_10.2
            oval oval:com.redhat.rhsa:tst:20131411003
          • comment glibc-common is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022004
        • AND
          • comment glibc-devel is earlier than 0:2.5-118.el5_10.2
            oval oval:com.redhat.rhsa:tst:20131411005
          • comment glibc-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022006
        • AND
          • comment glibc-headers is earlier than 0:2.5-118.el5_10.2
            oval oval:com.redhat.rhsa:tst:20131411007
          • comment glibc-headers is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022008
        • AND
          • comment glibc-utils is earlier than 0:2.5-118.el5_10.2
            oval oval:com.redhat.rhsa:tst:20131411009
          • comment glibc-utils is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022010
        • AND
          • comment nscd is earlier than 0:2.5-118.el5_10.2
            oval oval:com.redhat.rhsa:tst:20131411011
          • comment nscd is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022012
    rhsa
    id RHSA-2013:1411
    released 2013-10-08
    severity Moderate
    title RHSA-2013:1411: glibc security and bug fix update (Moderate)
  • bugzilla
    id 1007545
    title CVE-2013-4332 glibc: three integer overflows in memory allocator
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 6 is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • comment glibc is earlier than 0:2.12-1.132.el6
            oval oval:com.redhat.rhsa:tst:20131605001
          • comment glibc is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763002
        • AND
          • comment glibc-common is earlier than 0:2.12-1.132.el6
            oval oval:com.redhat.rhsa:tst:20131605003
          • comment glibc-common is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763004
        • AND
          • comment glibc-devel is earlier than 0:2.12-1.132.el6
            oval oval:com.redhat.rhsa:tst:20131605005
          • comment glibc-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763006
        • AND
          • comment glibc-headers is earlier than 0:2.12-1.132.el6
            oval oval:com.redhat.rhsa:tst:20131605007
          • comment glibc-headers is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763008
        • AND
          • comment glibc-static is earlier than 0:2.12-1.132.el6
            oval oval:com.redhat.rhsa:tst:20131605009
          • comment glibc-static is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763010
        • AND
          • comment glibc-utils is earlier than 0:2.12-1.132.el6
            oval oval:com.redhat.rhsa:tst:20131605011
          • comment glibc-utils is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763012
        • AND
          • comment nscd is earlier than 0:2.12-1.132.el6
            oval oval:com.redhat.rhsa:tst:20131605013
          • comment nscd is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763014
    rhsa
    id RHSA-2013:1605
    released 2013-11-20
    severity Moderate
    title RHSA-2013:1605: glibc security, bug fix, and enhancement update (Moderate)
rpms
  • glibc-0:2.5-118.el5_10.2
  • glibc-common-0:2.5-118.el5_10.2
  • glibc-debuginfo-0:2.5-118.el5_10.2
  • glibc-debuginfo-common-0:2.5-118.el5_10.2
  • glibc-devel-0:2.5-118.el5_10.2
  • glibc-headers-0:2.5-118.el5_10.2
  • glibc-utils-0:2.5-118.el5_10.2
  • nscd-0:2.5-118.el5_10.2
  • glibc-0:2.12-1.132.el6
  • glibc-common-0:2.12-1.132.el6
  • glibc-debuginfo-0:2.12-1.132.el6
  • glibc-debuginfo-common-0:2.12-1.132.el6
  • glibc-devel-0:2.12-1.132.el6
  • glibc-headers-0:2.12-1.132.el6
  • glibc-static-0:2.12-1.132.el6
  • glibc-utils-0:2.12-1.132.el6
  • nscd-0:2.12-1.132.el6
refmap via4
bid 62324
confirm
gentoo GLSA-201503-04
mandriva
  • MDVSA-2013:283
  • MDVSA-2013:284
mlist [oss-security] 20130912 Re: CVE Request: Three integer overflows in glibc memory allocator
secunia 55113
ubuntu USN-1991-1
Last major update 13-02-2023 - 04:46
Published 09-10-2013 - 22:55
Last modified 13-02-2023 - 04:46
Back to Top