It was discovered that klibc did not properly perform some mathematical operations, leading to an integer overflow. An attacker could possibly use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-31870)
It was discovered that klibc did not properly handled some memory allocations on 64 bit systems. An attacker could possibly use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-31871)
It was discovered that klibc did not properly handled some file sizes values on 32 bit systems. An attacker could possibly use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-31872)
It was discovered that klibc did not properly handled some memory allocations. An attacker could possibly use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-31873)
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "klibc-utils": "2.0.3-0ubuntu1.14.04.3+esm2", "libklibc": "2.0.3-0ubuntu1.14.04.3+esm2", "klibc-utils-udeb": "2.0.3-0ubuntu1.14.04.3+esm2", "libklibc-dev": "2.0.3-0ubuntu1.14.04.3+esm2", "libklibc-dev-dbgsym": "2.0.3-0ubuntu1.14.04.3+esm2", "libklibc-udeb": "2.0.3-0ubuntu1.14.04.3+esm2", "klibc-utils-floppy-udeb": "2.0.3-0ubuntu1.14.04.3+esm2" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "klibc-utils": "2.0.4-8ubuntu1.16.04.4+esm1", "libklibc": "2.0.4-8ubuntu1.16.04.4+esm1", "libklibc-dev-dbgsym": "2.0.4-8ubuntu1.16.04.4+esm1", "libklibc-dev": "2.0.4-8ubuntu1.16.04.4+esm1" } ] }