Jason Royes and Samuel Dytrych discovered that the memcpy() implementation for 32 bit ARM processors in the GNU C Library contained an integer underflow vulnerability. An attacker could possibly use this to cause a denial of service (application crash) or execute arbitrary code. (CVE-2020-6096)
It was discovered that the POSIX regex implementation in the GNU C Library did not properly parse alternatives. An attacker could use this to cause a denial of service. (CVE-2009-5155)
{ "availability": "No subscription required", "binaries": [ { "libc6-s390-dbgsym": "2.23-0ubuntu11.3", "libc6-dev": "2.23-0ubuntu11.3", "libc6-udeb-dbgsym": "2.23-0ubuntu11.3", "multiarch-support": "2.23-0ubuntu11.3", "libc6-ppc64": "2.23-0ubuntu11.3", "libc6-dev-s390": "2.23-0ubuntu11.3", "libc6-dev-i386": "2.23-0ubuntu11.3", "locales-all": "2.23-0ubuntu11.3", "libc6-amd64-dbgsym": "2.23-0ubuntu11.3", "glibc-source": "2.23-0ubuntu11.3", "libc6-dev-amd64": "2.23-0ubuntu11.3", "libc6-pic": "2.23-0ubuntu11.3", "nscd-dbgsym": "2.23-0ubuntu11.3", "nscd": "2.23-0ubuntu11.3", "glibc-doc": "2.23-0ubuntu11.3", "libc6-ppc64-dbgsym": "2.23-0ubuntu11.3", "libc6-armel": "2.23-0ubuntu11.3", "libc6-dbg": "2.23-0ubuntu11.3", "libc6": "2.23-0ubuntu11.3", "libc6-armel-dbgsym": "2.23-0ubuntu11.3", "libc-bin": "2.23-0ubuntu11.3", "libc6-i386": "2.23-0ubuntu11.3", "libc6-udeb": "2.23-0ubuntu11.3", "libc6-dev-x32": "2.23-0ubuntu11.3", "libc-bin-dbgsym": "2.23-0ubuntu11.3", "libc-dev-bin": "2.23-0ubuntu11.3", "libc6-amd64": "2.23-0ubuntu11.3", "libc6-x32": "2.23-0ubuntu11.3", "libc6-dbgsym": "2.23-0ubuntu11.3", "libc6-s390": "2.23-0ubuntu11.3", "libc6-dev-armel": "2.23-0ubuntu11.3", "libc6-dev-ppc64": "2.23-0ubuntu11.3", "libc6-i386-dbgsym": "2.23-0ubuntu11.3", "locales": "2.23-0ubuntu11.3", "libc-dev-bin-dbgsym": "2.23-0ubuntu11.3", "libc6-x32-dbgsym": "2.23-0ubuntu11.3" } ] }