The posixspawnfileactionsaddopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "2.19-0ubuntu6.1", "binary_name": "eglibc-source" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "glibc-doc" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc-bin" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc-dev-bin" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-amd64" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-armel" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-dbg" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-dev" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-dev-amd64" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-dev-armel" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-dev-i386" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-dev-ppc64" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-dev-x32" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-i386" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-pic" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-ppc64" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-prof" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-udeb" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libc6-x32" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libnss-dns-udeb" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "libnss-files-udeb" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "multiarch-support" }, { "binary_version": "2.19-0ubuntu6.1", "binary_name": "nscd" } ] }