It was discovered that the GNU C Library incorrectly handled the strxfrm() function. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8982)
It was discovered that an integer overflow existed in the IOwstr_overflow() function of the GNU C Library. An attacker could use this to cause a denial of service or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8983)
It was discovered that the fnmatch() function in the GNU C Library did not properly handle certain malformed patterns. An attacker could use this to cause a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8984)
Alexander Cherepanov discovered a stack-based buffer overflow in the glob implementation of the GNU C Library. An attacker could use this to specially craft a directory layout and cause a denial of service. (CVE-2016-1234)
Florian Weimer discovered a NULL pointer dereference in the DNS resolver of the GNU C Library. An attacker could use this to cause a denial of service. (CVE-2015-5180)
Michael Petlan discovered an unbounded stack allocation in the getaddrinfo() function of the GNU C Library. An attacker could use this to cause a denial of service. (CVE-2016-3706)
Aldy Hernandez discovered an unbounded stack allocation in the sunrpc implementation in the GNU C Library. An attacker could use this to cause a denial of service. (CVE-2016-4429)
Tim Ruehsen discovered that the getaddrinfo() implementation in the GNU C Library did not properly track memory allocations. An attacker could use this to cause a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-5417)
Andreas Schwab discovered that the GNU C Library on ARM 32-bit platforms did not properly set up execution contexts. An attacker could use this to cause a denial of service. (CVE-2016-6323)
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "eglibc-source"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc-bin"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc-dev-bin"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-amd64"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-armel"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-dev"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-dev-amd64"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-dev-armel"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-dev-i386"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-dev-ppc64"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-dev-x32"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-i386"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-pic"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-ppc64"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-prof"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "libc6-x32"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "multiarch-support"
},
{
"binary_version": "2.19-0ubuntu6.10",
"binary_name": "nscd"
}
]
}
{
"cves": [
{
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2015-8982"
},
{
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2015-8983"
},
{
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2015-8984"
},
{
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2016-1234"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2016-3706"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2016-4429"
},
{
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2016-6323"
}
],
"ecosystem": "Ubuntu:14.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "glibc-source"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc-bin"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc-dev-bin"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-amd64"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-armel"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-dev"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-dev-amd64"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-dev-armel"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-dev-i386"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-dev-ppc64"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-dev-s390"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-dev-x32"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-i386"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-pic"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-ppc64"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-s390"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "libc6-x32"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "locales"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "locales-all"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "multiarch-support"
},
{
"binary_version": "2.23-0ubuntu6",
"binary_name": "nscd"
}
]
}
{
"cves": [
{
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2016-1234"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2016-3706"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2016-4429"
},
{
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2016-5417"
},
{
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2016-6323"
}
],
"ecosystem": "Ubuntu:16.04:LTS"
}