It was discovered that the GNU C Library incorrectly handled the strxfrm() function. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8982)
It was discovered that an integer overflow existed in the IOwstr_overflow() function of the GNU C Library. An attacker could use this to cause a denial of service or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8983)
It was discovered that the fnmatch() function in the GNU C Library did not properly handle certain malformed patterns. An attacker could use this to cause a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8984)
Alexander Cherepanov discovered a stack-based buffer overflow in the glob implementation of the GNU C Library. An attacker could use this to specially craft a directory layout and cause a denial of service. (CVE-2016-1234)
Florian Weimer discovered a NULL pointer dereference in the DNS resolver of the GNU C Library. An attacker could use this to cause a denial of service. (CVE-2015-5180)
Michael Petlan discovered an unbounded stack allocation in the getaddrinfo() function of the GNU C Library. An attacker could use this to cause a denial of service. (CVE-2016-3706)
Aldy Hernandez discovered an unbounded stack allocation in the sunrpc implementation in the GNU C Library. An attacker could use this to cause a denial of service. (CVE-2016-4429)
Tim Ruehsen discovered that the getaddrinfo() implementation in the GNU C Library did not properly track memory allocations. An attacker could use this to cause a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-5417)
Andreas Schwab discovered that the GNU C Library on ARM 32-bit platforms did not properly set up execution contexts. An attacker could use this to cause a denial of service. (CVE-2016-6323)
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "eglibc-source",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc-bin",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc-dev-bin",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-amd64",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-armel",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-dev",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-dev-amd64",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-dev-armel",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-dev-i386",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-dev-ppc64",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-dev-x32",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-i386",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-pic",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-ppc64",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-prof",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "libc6-x32",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "multiarch-support",
"binary_version": "2.19-0ubuntu6.10"
},
{
"binary_name": "nscd",
"binary_version": "2.19-0ubuntu6.10"
}
]
}
{
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2015-8982"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2015-8983"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2015-8984"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2016-1234"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2016-3706"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2016-4429"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2016-6323"
}
],
"ecosystem": "Ubuntu:14.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "glibc-source",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc-bin",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc-dev-bin",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-amd64",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-armel",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-dev",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-dev-amd64",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-dev-armel",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-dev-i386",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-dev-ppc64",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-dev-s390",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-dev-x32",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-i386",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-pic",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-ppc64",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-s390",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "libc6-x32",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "locales",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "locales-all",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "multiarch-support",
"binary_version": "2.23-0ubuntu6"
},
{
"binary_name": "nscd",
"binary_version": "2.23-0ubuntu6"
}
]
}
{
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2016-1234"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2016-3706"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2016-4429"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2016-5417"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
],
"id": "CVE-2016-6323"
}
],
"ecosystem": "Ubuntu:16.04:LTS"
}