Your submission was sent successfully! Close

USN-4954-1: GNU C Library vulnerabilities

14 May 2021

Several security issues were fixed in GNU C Library.




Jason Royes and Samuel Dytrych discovered that the memcpy()
implementation for 32 bit ARM processors in the GNU C Library contained
an integer underflow vulnerability. An attacker could possibly use
this to cause a denial of service (application crash) or execute
arbitrary code. (CVE-2020-6096)

It was discovered that the POSIX regex implementation in the GNU C
Library did not properly parse alternatives. An attacker could use this
to cause a denial of service. (CVE-2009-5155)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-5310-1: libc-dev-bin, libc6-s390, multiarch-support, locales-all, libc-bin, libc-devtools, libc6-dev, libc6-dev-x32, libc6-lse, libc6-armel, libc6-dev-amd64, glibc-doc, glibc, libc6-dev-i386, libc6-amd64, libc6, locales, libc6-dev-armel, libc6-i386, libc6-x32, libc6-prof, libc6-pic, nscd, libc6-dev-s390, glibc-source