Back to bug 1007545

Who When What Removed Added
Vincent Danen 2013-09-12 18:06:21 UTC CC ashankar, codonell, jakub, jkurik, law, mfranc, pfrankli, pfrields, schwab, spoyarek
Vincent Danen 2013-09-12 18:07:56 UTC Blocks 1007547
Huzaifa S. Sidhpurwala 2013-09-16 06:04:53 UTC Depends On 1008298
Huzaifa S. Sidhpurwala 2013-09-16 06:05:29 UTC Depends On 1008299
Huzaifa S. Sidhpurwala 2013-09-16 06:22:39 UTC Depends On 1008310
Huzaifa S. Sidhpurwala 2013-09-16 06:27:29 UTC Blocks 974906
Huzaifa S. Sidhpurwala 2013-09-25 07:43:26 UTC Depends On 1011804
Huzaifa S. Sidhpurwala 2013-09-25 07:43:57 UTC Depends On 1011805
Carlos O'Donell 2013-10-28 21:26:09 UTC Doc Text Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions (pvalloc, valloc, and memalign). If an application used such a function, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-4332).
Huzaifa S. Sidhpurwala 2013-11-22 06:06:25 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2013-11-22 01:06:25 UTC
Martin Prpič 2014-12-10 14:10:26 UTC Doc Text Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions (pvalloc, valloc, and memalign). If an application used such a function, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-4332). Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions (pvalloc, valloc, and memalign). If an application used such a function, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.
Ján Rusnačko 2015-07-31 07:10:36 UTC Whiteboard impact=moderate,public=20130820,reported=20130911,source=oss-sec,cvss2=4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P,rhel-5/glibc=affected,rhel-6/glibc=affected,rhel-7/glibc=affected,fedora-all/glibc=affected impact=moderate,public=20130820,reported=20130911,source=oss-security,cvss2=4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P,rhel-5/glibc=affected,rhel-6/glibc=affected,rhel-7/glibc=affected,fedora-all/glibc=affected
Vincent Danen 2015-10-15 18:00:44 UTC Whiteboard impact=moderate,public=20130820,reported=20130911,source=oss-security,cvss2=4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P,rhel-5/glibc=affected,rhel-6/glibc=affected,rhel-7/glibc=affected,fedora-all/glibc=affected impact=moderate,public=20130820,reported=20130911,source=oss-security,cvss2=4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P,rhel-5/glibc=affected,rhel-6/glibc=affected,rhel-7/glibc=notaffected,fedora-all/glibc=affected
Florian Weimer 2016-02-04 06:48:05 UTC CC fweimer
Ján Rusnačko 2016-03-04 12:03:18 UTC Whiteboard impact=moderate,public=20130820,reported=20130911,source=oss-security,cvss2=4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P,rhel-5/glibc=affected,rhel-6/glibc=affected,rhel-7/glibc=notaffected,fedora-all/glibc=affected impact=moderate,public=20130820,reported=20130911,source=oss-security,cvss2=4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P,rhel-5/glibc=affected,rhel-6/glibc=affected,rhel-7/glibc=notaffected,fedora-all/glibc=affected,cwe=CWE-190[auto]
Product Security DevOps Team 2019-09-29 13:08:22 UTC Whiteboard impact=moderate,public=20130820,reported=20130911,source=oss-security,cvss2=4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P,rhel-5/glibc=affected,rhel-6/glibc=affected,rhel-7/glibc=notaffected,fedora-all/glibc=affected,cwe=CWE-190[auto]

Back to bug 1007545