Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
{ "binaries": [ { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "eglibc-source" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc-bin" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc-dev-bin" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-amd64" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-armel" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-dev" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-dev-amd64" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-dev-armel" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-dev-i386" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-dev-x32" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-i386" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-pic" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-prof" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "libc6-x32" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "multiarch-support" }, { "binary_version": "2.19-0ubuntu6.15+esm4", "binary_name": "nscd" } ] }