USN-4416-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4416-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4416-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4416-1
Related
Published
2020-07-06T18:10:11.630219Z
Modified
2020-07-06T18:10:11.630219Z
Summary
glibc vulnerabilities
Details

Florian Weimer discovered that the GNU C Library incorrectly handled certain memory operations. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-12133)

It was discovered that the GNU C Library incorrectly handled certain SSE2-optimized memmove operations. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-18269)

It was discovered that the GNU C Library incorrectly handled certain pathname operations. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-11236)

It was discovered that the GNU C Library incorrectly handled certain AVX-512-optimized mempcpy operations. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-11237)

It was discovered that the GNU C Library incorrectly handled certain hostname loookups. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-19591)

Jakub Wilk discovered that the GNU C Library incorrectly handled certain memalign functions. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2018-6485)

It was discovered that the GNU C Library incorrectly ignored the LDPREFERMAP32BITEXEC environment variable after security transitions. A local attacker could use this issue to bypass ASLR restrictions. (CVE-2019-19126)

It was discovered that the GNU C Library incorrectly handled certain regular expressions. A remote attacker could possibly use this issue to cause the GNU C Library to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9169)

It was discovered that the GNU C Library incorrectly handled certain bit patterns. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2020-10029)

It was discovered that the GNU C Library incorrectly handled certain signal trampolines on PowerPC. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-1751)

It was discovered that the GNU C Library incorrectly handled tilde expansion. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-1752)

References

Affected packages

Ubuntu:16.04:LTS / glibc

Package

Name
glibc
Purl
pkg:deb/ubuntu/glibc@2.23-0ubuntu11.2?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.23-0ubuntu11.2

Affected versions

2.*

2.21-0ubuntu4
2.21-0ubuntu5
2.21-0ubuntu6
2.23-0ubuntu1
2.23-0ubuntu2
2.23-0ubuntu3
2.23-0ubuntu4
2.23-0ubuntu5
2.23-0ubuntu6
2.23-0ubuntu7
2.23-0ubuntu9
2.23-0ubuntu10
2.23-0ubuntu11

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libc6-s390-dbgsym": "2.23-0ubuntu11.2",
            "libc6-dev": "2.23-0ubuntu11.2",
            "libc6-udeb-dbgsym": "2.23-0ubuntu11.2",
            "multiarch-support": "2.23-0ubuntu11.2",
            "libc6-ppc64": "2.23-0ubuntu11.2",
            "libc6-dev-s390": "2.23-0ubuntu11.2",
            "libc6-dev-i386": "2.23-0ubuntu11.2",
            "locales-all": "2.23-0ubuntu11.2",
            "libc6-amd64-dbgsym": "2.23-0ubuntu11.2",
            "glibc-source": "2.23-0ubuntu11.2",
            "libc6-dev-amd64": "2.23-0ubuntu11.2",
            "libc6-pic": "2.23-0ubuntu11.2",
            "nscd-dbgsym": "2.23-0ubuntu11.2",
            "nscd": "2.23-0ubuntu11.2",
            "glibc-doc": "2.23-0ubuntu11.2",
            "libc6-ppc64-dbgsym": "2.23-0ubuntu11.2",
            "libc6-armel": "2.23-0ubuntu11.2",
            "libc6-dbg": "2.23-0ubuntu11.2",
            "libc6": "2.23-0ubuntu11.2",
            "libc6-armel-dbgsym": "2.23-0ubuntu11.2",
            "libc-bin": "2.23-0ubuntu11.2",
            "libc6-i386": "2.23-0ubuntu11.2",
            "libc6-udeb": "2.23-0ubuntu11.2",
            "libc6-dev-x32": "2.23-0ubuntu11.2",
            "libc-bin-dbgsym": "2.23-0ubuntu11.2",
            "libc-dev-bin": "2.23-0ubuntu11.2",
            "libc6-amd64": "2.23-0ubuntu11.2",
            "libc6-x32": "2.23-0ubuntu11.2",
            "libc6-dbgsym": "2.23-0ubuntu11.2",
            "libc6-s390": "2.23-0ubuntu11.2",
            "libc6-dev-armel": "2.23-0ubuntu11.2",
            "libc6-dev-ppc64": "2.23-0ubuntu11.2",
            "libc6-i386-dbgsym": "2.23-0ubuntu11.2",
            "locales": "2.23-0ubuntu11.2",
            "libc-dev-bin-dbgsym": "2.23-0ubuntu11.2",
            "libc6-x32-dbgsym": "2.23-0ubuntu11.2"
        }
    ]
}

Ubuntu:18.04:LTS / glibc

Package

Name
glibc
Purl
pkg:deb/ubuntu/glibc@2.27-3ubuntu1.2?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.27-3ubuntu1.2

Affected versions

2.*

2.26-0ubuntu2
2.26-0ubuntu2.1
2.27-0ubuntu2
2.27-0ubuntu3
2.27-3ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libc6-s390-dbgsym": "2.27-3ubuntu1.2",
            "libc6-dev": "2.27-3ubuntu1.2",
            "multiarch-support": "2.27-3ubuntu1.2",
            "libc6-dev-s390": "2.27-3ubuntu1.2",
            "libc6-dev-i386": "2.27-3ubuntu1.2",
            "locales-all": "2.27-3ubuntu1.2",
            "libc6-amd64-dbgsym": "2.27-3ubuntu1.2",
            "libc6-pic": "2.27-3ubuntu1.2",
            "glibc-source": "2.27-3ubuntu1.2",
            "libc6-dev-amd64": "2.27-3ubuntu1.2",
            "nscd-dbgsym": "2.27-3ubuntu1.2",
            "nscd": "2.27-3ubuntu1.2",
            "glibc-doc": "2.27-3ubuntu1.2",
            "libc6-armel": "2.27-3ubuntu1.2",
            "libc6-armel-dbgsym": "2.27-3ubuntu1.2",
            "libc6": "2.27-3ubuntu1.2",
            "libc6-dbg": "2.27-3ubuntu1.2",
            "libc-bin": "2.27-3ubuntu1.2",
            "libc6-i386": "2.27-3ubuntu1.2",
            "libc6-udeb": "2.27-3ubuntu1.2",
            "libc6-dev-x32": "2.27-3ubuntu1.2",
            "libc-bin-dbgsym": "2.27-3ubuntu1.2",
            "libc-dev-bin": "2.27-3ubuntu1.2",
            "libc6-amd64": "2.27-3ubuntu1.2",
            "libc6-x32": "2.27-3ubuntu1.2",
            "libc6-s390": "2.27-3ubuntu1.2",
            "libc6-dev-armel": "2.27-3ubuntu1.2",
            "libc6-i386-dbgsym": "2.27-3ubuntu1.2",
            "locales": "2.27-3ubuntu1.2",
            "libc-dev-bin-dbgsym": "2.27-3ubuntu1.2",
            "libc6-x32-dbgsym": "2.27-3ubuntu1.2"
        }
    ]
}