- glibc_2.23-0ubuntu6 (ubuntu-xenial)
- 2.23-0ubuntu11.3
- 2022-06-10 08:16:32
- CVE CVE-2015-5180, CVSSv2 Score: 1.2
- Description:
Patch reverted by vendor. res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash)
- Patch: glibc/2.23/revert-CVE-2015-5180.diff
- CVE CVE-2017-1000366, CVSSv2 Score: 7.4
- Description:
A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult.
- Patch: glibc/2.23/CVE-2017-1000366.patch
- CVE , CVSSv2 Score:
- Description:
rtld: Reject overly long LD_PRELOAD path elements
- Patch: glibc/2.23/upstream-harden-rtld-Reject-overly-long-LD_PRELOAD.patch
- CVE CVE-2017-1000408, CVSSv2 Score: 3.3
- Description:
A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366
- Patch: glibc/2.23/cvs-compute-correct-array-size-in-_dl_init_paths.diff
- CVE CVE-2017-1000409, CVSSv2 Score: 4.7
- Description:
A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366
- Patch: glibc/2.23/cvs-count-components-of-expanded-path-in-_dl_init_paths.diff
- CVE CVE-2017-15670, CVSSv2 Score: 7.0
- Description:
Fix one-byte buffer overflow in glob() with GLOB_TILDE
- Patch: glibc/2.23/cvs-fix-one-byte-glob-overflow.diff
- CVE CVE-2017-15804, CVSSv2 Score: 5.5
- Description:
Fix buffer overflow during GLOB_TILDE unescaping
- Patch: glibc/2.23/cvs-fix-glob-buffer-overflow.diff
- CVE CVE-2017-16997, CVSSv2 Score: 7.8
- Description:
Fix incorrect handling of RPATH or RUNPATH containing $ORIGIN
- Patch: glibc/2.23/cvs-elf-check-for-empty-tokens.diff
- CVE CVE-2018-1000001, CVSSv2 Score: 7.0
- Description:
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution
- Patch: glibc/2.23/cvs-make-getcwd-fail-if-path-is-no-absolute.diff
- CVE CVE-2017-12133, CVSSv2 Score: 3.7
- Description:
Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.
- Patch: glibc/2.23/CVE-2017-12133.patch
- CVE CVE-2017-18269, CVSSv2 Score: 7.3
- Description:
An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the sourc$
- Patch: glibc/2.23/CVE-2017-18269.patch
- CVE CVE-2018-11236, CVSSv2 Score: 7.8
- Description:
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-$
- Patch: glibc/2.23/CVE-2018-11236.patch
- CVE CVE-2018-11237, CVSSv2 Score: 5.6
- Description:
A buffer overflow has been discovered in the GNU C Library (aka glibc or libc6) in the __mempcpy_avx512_no_vzeroupper function when particular conditions are met. An attacker could use this vulnerability to cause a denial of service or potentially execute code
- Patch: glibc/2.23/CVE-2018-11237.patch
- CVE CVE-2018-6485, CVSSv2 Score: 5.3
- Description:
An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption
- Patch: glibc/2.23/CVE-2018-6485.patch
- CVE CVE-2019-19126, CVSSv2 Score: 2.9
- Description:
https://access.redhat.com/security/cve/CVE-2019-19126
- Patch: glibc/2.23/CVE-2019-19126.patch
- CVE CVE-2019-9169, CVSSv2 Score: 6.5
- Description:
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
- Patch: glibc/2.23/CVE-2019-9169.patch
- CVE CVE-2020-10029, CVSSv2 Score: 5.7
- Description:
A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.
- Patch: glibc/2.23/CVE-2020-10029.patch
- CVE CVE-2020-1751, CVSSv2 Score: 7.0
- Description:
An out-of-bounds write vulnerability was found in glibc when handling signal trampolines on PowerPC. The backtrace function did not properly check the array bounds when storing the frame address resulting in a denial of service or po$
- Patch: glibc/2.23/CVE-2020-1751.patch
- CVE CVE-2020-1752, CVSSv2 Score: 7.0
- Description:
Fix use-after-free in glob when expanding ~user
- Patch: glibc/2.23/CVE-2020-1752.patch
- CVE CVE-2017-16997, CVSSv2 Score: 7.8
- Description:
Fix incorrect handling of RPATH or RUNPATH containing $ORIGIN
- Patch: glibc/2.23/adapt-cvs-elf-check-for-empty-tokens.diff
- CVE CVE-2009-5155, CVSSv2 Score: 7.5
- Description:
Fix read overrun in regex
- Patch: glibc/2.23/CVE-2009-5155.patch
- CVE CVE-2021-3999, CVSSv2 Score: 7.4
- Description:
An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1.
- Patch: glibc/2.23/CVE-2021-3999.patch
- CVE CVE-2022-23218, CVSSv2 Score: 7.0
- Description:
A stack based buffer-overflow vulnerability was found in the deprecated compatibility function svcunix_create() in the sunrpc's svc_unix.c module of the GNU C Library (aka glibc) through 2.34
- Patch: glibc/2.23/CVE-2022-23218-pre1.patch
- CVE CVE-2022-23218, CVSSv2 Score: 7.0
- Description:
A stack based buffer-overflow vulnerability was found in the deprecated compatibility function svcunix_create() in the sunrpc's svc_unix.c module of the GNU C Library (aka glibc) through 2.34
- Patch: glibc/2.23/CVE-2022-23218.patch
- CVE CVE-2022-23219, CVSSv2 Score: 7.0
- Description:
A stack based buffer-overflow vulnerability was found in the deprecated compatibility function clnt_create() in the sunrpc's clnt_gen.c module
- Patch: glibc/2.23/CVE-2022-23219.patch