{"id":"USN-5699-1","summary":"glibc vulnerabilities","details":"Jan Engelhardt, Tavis Ormandy, and others discovered that the GNU C Library\niconv feature incorrectly handled certain input sequences. An attacker\ncould possibly use this issue to cause the GNU C Library to hang or crash,\nresulting in a denial of service. (CVE-2021-3326)\n\nIt was discovered that the GNU C Library nscd daemon incorrectly handled\ncertain netgroup lookups. An attacker could possibly use this issue to\ncause the GNU C Library to crash, resulting in a denial of service.\n(CVE-2021-35942)\n","modified":"2026-04-24T09:31:32.394583Z","published":"2022-10-25T22:48:23Z","related":["UBUNTU-CVE-2021-3326","UBUNTU-CVE-2021-35942"],"upstream":["CVE-2021-3326","CVE-2021-35942","UBUNTU-CVE-2021-3326","UBUNTU-CVE-2021-35942"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5699-1"}],"affected":[{"package":{"name":"glibc","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/glibc@2.23-0ubuntu11.3+esm2?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.23-0ubuntu11.3+esm2"}]}],"versions":["2.21-0ubuntu4","2.21-0ubuntu5","2.21-0ubuntu6","2.23-0ubuntu1","2.23-0ubuntu2","2.23-0ubuntu3","2.23-0ubuntu4","2.23-0ubuntu5","2.23-0ubuntu6","2.23-0ubuntu7","2.23-0ubuntu9","2.23-0ubuntu10","2.23-0ubuntu11","2.23-0ubuntu11.2","2.23-0ubuntu11.3","2.23-0ubuntu11.3+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"glibc-source","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc-bin","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc-dev-bin","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-amd64","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-armel","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-dev-amd64","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-dev-armel","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-dev-i386","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-dev-s390","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-dev-x32","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-i386","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-pic","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-s390","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"libc6-x32","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"locales","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"locales-all","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"multiarch-support","binary_version":"2.23-0ubuntu11.3+esm2"},{"binary_name":"nscd","binary_version":"2.23-0ubuntu11.3+esm2"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5699-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[]}}}],"schema_version":"1.7.5"}