Martin Carpenter discovered that pt_chown in the GNU C Library did not properly check permissions for tty files. A local attacker could use this to gain administrative privileges or expose sensitive information. (CVE-2013-2207, CVE-2016-2856)
Robin Hack discovered that the Name Service Switch (NSS) implementation in the GNU C Library did not properly manage its file descriptors. An attacker could use this to cause a denial of service (infinite loop). (CVE-2014-8121)
Joseph Myers discovered that the GNU C Library did not properly handle long arguments to functions returning a representation of Not a Number (NaN). An attacker could use this to cause a denial of service (stack exhaustion leading to an application crash) or possibly execute arbitrary code. (CVE-2014-9761)
Arjun Shankar discovered that in certain situations the nss_dns code in the GNU C Library did not properly account buffer sizes when passed an unaligned buffer. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2015-1781)
Sumit Bose and Lukas Slebodnik discovered that the Name Service Switch (NSS) implementation in the GNU C Library did not handle long lines in the files databases correctly. A local attacker could use this to cause a denial of service (application crash) or possibly execute arbitrary code. (CVE-2015-5277)
Adam Nielsen discovered that the strftime function in the GNU C Library did not properly handle out-of-range argument data. An attacker could use this to cause a denial of service (application crash) or possibly expose sensitive information. (CVE-2015-8776)
Hector Marco and Ismael Ripoll discovered that the GNU C Library allowed the pointer-guarding protection mechanism to be disabled by honoring the LDPOINTERGUARD environment variable across privilege boundaries. A local attacker could use this to exploit an existing vulnerability more easily. (CVE-2015-8777)
Szabolcs Nagy discovered that the hcreate functions in the GNU C Library did not properly check its size argument, leading to an integer overflow. An attacker could use to cause a denial of service (application crash) or possibly execute arbitrary code. (CVE-2015-8778)
Maksymilian Arciemowicz discovered a stack-based buffer overflow in the catopen function in the GNU C Library when handling long catalog names. An attacker could use this to cause a denial of service (application crash) or possibly execute arbitrary code. (CVE-2015-8779)
Florian Weimer discovered that the getnetbyname implementation in the GNU C Library did not properly handle long names passed as arguments. An attacker could use to cause a denial of service (stack exhaustion leading to an application crash). (CVE-2016-3075)
{
"binaries": [
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "eglibc-source"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc-bin"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc-dev-bin"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-amd64"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-armel"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-dev"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-dev-amd64"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-dev-armel"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-dev-i386"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-dev-ppc64"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-dev-x32"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-i386"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-pic"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-ppc64"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-prof"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "libc6-x32"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "multiarch-support"
},
{
"binary_version": "2.19-0ubuntu6.8",
"binary_name": "nscd"
}
],
"availability": "No subscription required"
}
{
"ecosystem": "Ubuntu:14.04:LTS",
"cves": [
{
"id": "CVE-2013-2207",
"severity": [
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2014-8121",
"severity": [
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2015-1781",
"severity": [
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2015-5277",
"severity": [
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2015-8776",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2015-8777",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2015-8778",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2015-8779",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2016-2856",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2016-3075",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
}
]
}