Your submission was sent successfully! Close

USN-5310-2: GNU C Library vulnerabilities

7 March 2022

Several security issues were fixed in GNU C Library.

Releases

Packages

Details

USN-5310-1 fixed several vulnerabilities in GNU. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that the GNU C library getcwd function incorrectly
handled buffers. An attacker could use this issue to cause the GNU C
Library to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-3999)

It was discovered that the GNU C Library sunrpc module incorrectly handled
buffer lengths. An attacker could possibly use this issue to cause the GNU
C Library to crash, resulting in a denial of service. (CVE-2022-23218,
CVE-2022-23219)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-5310-1: glibc-doc, libc6-dev-amd64, libc-bin, libc6-i386, libc6, glibc, libc6-pic, glibc-source, multiarch-support, libc6-s390, libc6-x32, nscd, libc6-prof, libc6-dev-i386, libc6-armel, libc-devtools, libc6-amd64, libc6-dev-x32, libc6-dev-s390, libc6-dev-armel, libc6-dev, locales-all, locales, libc-dev-bin, libc6-lse