USN-2985-2

Source
https://ubuntu.com/security/notices/USN-2985-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2985-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2985-2
Related
Published
2016-05-26T14:59:31.847249Z
Modified
2016-05-26T14:59:31.847249Z
Summary
eglibc, glibc regression
Details

USN-2985-1 fixed vulnerabilities in the GNU C Library. The fix for CVE-2014-9761 introduced a regression which affected applications that use the libm library but were not fully restarted after the upgrade. This update removes the fix for CVE-2014-9761 and a future update will be provided to address this issue.

We apologize for the inconvenience.

Original advisory details:

Martin Carpenter discovered that pt_chown in the GNU C Library did not properly check permissions for tty files. A local attacker could use this to gain administrative privileges or expose sensitive information. (CVE-2013-2207, CVE-2016-2856)

Robin Hack discovered that the Name Service Switch (NSS) implementation in the GNU C Library did not properly manage its file descriptors. An attacker could use this to cause a denial of service (infinite loop). (CVE-2014-8121)

Joseph Myers discovered that the GNU C Library did not properly handle long arguments to functions returning a representation of Not a Number (NaN). An attacker could use this to cause a denial of service (stack exhaustion leading to an application crash) or possibly execute arbitrary code. (CVE-2014-9761)

Arjun Shankar discovered that in certain situations the nss_dns code in the GNU C Library did not properly account buffer sizes when passed an unaligned buffer. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2015-1781)

Sumit Bose and Lukas Slebodnik discovered that the Name Service Switch (NSS) implementation in the GNU C Library did not handle long lines in the files databases correctly. A local attacker could use this to cause a denial of service (application crash) or possibly execute arbitrary code. (CVE-2015-5277)

Adam Nielsen discovered that the strftime function in the GNU C Library did not properly handle out-of-range argument data. An attacker could use this to cause a denial of service (application crash) or possibly expose sensitive information. (CVE-2015-8776)

Hector Marco and Ismael Ripoll discovered that the GNU C Library allowed the pointer-guarding protection mechanism to be disabled by honoring the LDPOINTERGUARD environment variable across privilege boundaries. A local attacker could use this to exploit an existing vulnerability more easily. (CVE-2015-8777)

Szabolcs Nagy discovered that the hcreate functions in the GNU C Library did not properly check its size argument, leading to an integer overflow. An attacker could use to cause a denial of service (application crash) or possibly execute arbitrary code. (CVE-2015-8778)

Maksymilian Arciemowicz discovered a stack-based buffer overflow in the catopen function in the GNU C Library when handling long catalog names. An attacker could use this to cause a denial of service (application crash) or possibly execute arbitrary code. (CVE-2015-8779)

Florian Weimer discovered that the getnetbyname implementation in the GNU C Library did not properly handle long names passed as arguments. An attacker could use to cause a denial of service (stack exhaustion leading to an application crash). (CVE-2016-3075)

References

Affected packages

Ubuntu:14.04:LTS / eglibc

Package

Name
eglibc
Purl
pkg:deb/ubuntu/eglibc?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.19-0ubuntu6.9

Affected versions

2.*

2.17-93ubuntu4
2.18-0ubuntu1
2.18-0ubuntu2
2.18-0ubuntu4
2.18-0ubuntu5
2.18-0ubuntu6
2.18-0ubuntu7
2.19-0ubuntu2
2.19-0ubuntu3
2.19-0ubuntu4
2.19-0ubuntu5
2.19-0ubuntu6
2.19-0ubuntu6.1
2.19-0ubuntu6.3
2.19-0ubuntu6.4
2.19-0ubuntu6.5
2.19-0ubuntu6.6
2.19-0ubuntu6.7
2.19-0ubuntu6.8

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "eglibc-source"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "glibc-doc"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc-bin"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc-bin-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc-dev-bin"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc-dev-bin-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-amd64"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-amd64-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-armel"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-armel-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-dbg"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-dev"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-dev-amd64"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-dev-armel"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-dev-i386"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-dev-ppc64"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-dev-x32"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-i386"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-i386-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-pic"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-ppc64"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-ppc64-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-prof"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-udeb"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-udeb-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-x32"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libc6-x32-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libnss-dns-udeb"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libnss-dns-udeb-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libnss-files-udeb"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "libnss-files-udeb-dbgsym"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "multiarch-support"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "nscd"
        },
        {
            "binary_version": "2.19-0ubuntu6.9",
            "binary_name": "nscd-dbgsym"
        }
    ]
}