First published: Tue Mar 21 2017(Updated: )
It was discovered that the GNU C Library incorrectly handled the strxfrm() function. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8982) It was discovered that an integer overflow existed in the _IO_wstr_overflow() function of the GNU C Library. An attacker could use this to cause a denial of service or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8983) It was discovered that the fnmatch() function in the GNU C Library did not properly handle certain malformed patterns. An attacker could use this to cause a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8984) Alexander Cherepanov discovered a stack-based buffer overflow in the glob implementation of the GNU C Library. An attacker could use this to specially craft a directory layout and cause a denial of service. (CVE-2016-1234) Florian Weimer discovered a NULL pointer dereference in the DNS resolver of the GNU C Library. An attacker could use this to cause a denial of service. (CVE-2015-5180) Michael Petlan discovered an unbounded stack allocation in the getaddrinfo() function of the GNU C Library. An attacker could use this to cause a denial of service. (CVE-2016-3706) Aldy Hernandez discovered an unbounded stack allocation in the sunrpc implementation in the GNU C Library. An attacker could use this to cause a denial of service. (CVE-2016-4429) Tim Ruehsen discovered that the getaddrinfo() implementation in the GNU C Library did not properly track memory allocations. An attacker could use this to cause a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-5417) Andreas Schwab discovered that the GNU C Library on ARM 32-bit platforms did not properly set up execution contexts. An attacker could use this to cause a denial of service. (CVE-2016-6323)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libc6 | <2.23-0ubuntu6 | 2.23-0ubuntu6 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/libc6 | <2.19-0ubuntu6.10 | 2.19-0ubuntu6.10 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/libc6 | <2.15-0ubuntu10.16 | 2.15-0ubuntu10.16 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-3239-1 is critical due to the potential for denial of service or arbitrary code execution.
To fix USN-3239-1, update the libc6 package to a version later than 2.23-0ubuntu6 for Ubuntu 16.04, later than 2.19-0ubuntu6.10 for Ubuntu 14.04, or later than 2.15-0ubuntu10.16 for Ubuntu 12.04.
USN-3239-1 affects Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, and does not affect later versions.
The vulnerability in USN-3239-1 involves the strxfrm() function in the GNU C Library.
Yes, USN-3239-1 can potentially be exploited remotely by an attacker, leading to denial of service.