{"id":"USN-5768-1","summary":"glibc vulnerabilities","details":"Jan Engelhardt, Tavis Ormandy, and others discovered that the GNU C Library\niconv feature incorrectly handled certain input sequences. An attacker\ncould possibly use this issue to cause the GNU C Library to hang or crash,\nresulting in a denial of service.  (CVE-2016-10228, CVE-2019-25013,\nCVE-2020-27618)\n\nIt was discovered that the GNU C Library did not properly handled DNS\nresponses when ENDS0 is enabled. An attacker could possibly use this issue\nto cause fragmentation-based attacks. (CVE-2017-12132)\n","modified":"2026-04-27T16:27:30.095197Z","published":"2022-12-08T13:17:39Z","related":["UBUNTU-CVE-2016-10228","UBUNTU-CVE-2017-12132","UBUNTU-CVE-2019-25013","UBUNTU-CVE-2020-27618"],"upstream":["CVE-2016-10228","CVE-2017-12132","CVE-2019-25013","CVE-2020-27618","UBUNTU-CVE-2016-10228","UBUNTU-CVE-2017-12132","UBUNTU-CVE-2019-25013","UBUNTU-CVE-2020-27618"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5768-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-10228"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12132"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-25013"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27618"}],"affected":[{"package":{"name":"glibc","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/glibc@2.23-0ubuntu11.3+esm3?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.23-0ubuntu11.3+esm3"}]}],"versions":["2.21-0ubuntu4","2.21-0ubuntu5","2.21-0ubuntu6","2.23-0ubuntu1","2.23-0ubuntu2","2.23-0ubuntu3","2.23-0ubuntu4","2.23-0ubuntu5","2.23-0ubuntu6","2.23-0ubuntu7","2.23-0ubuntu9","2.23-0ubuntu10","2.23-0ubuntu11","2.23-0ubuntu11.2","2.23-0ubuntu11.3","2.23-0ubuntu11.3+esm1","2.23-0ubuntu11.3+esm2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"glibc-source","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc-bin","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc-dev-bin","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-amd64","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-armel","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-dev-amd64","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-dev-armel","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-dev-i386","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-dev-s390","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-dev-x32","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-i386","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-pic","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-s390","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"libc6-x32","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"locales","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"locales-all","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"multiarch-support","binary_version":"2.23-0ubuntu11.3+esm3"},{"binary_name":"nscd","binary_version":"2.23-0ubuntu11.3+esm3"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}],"id":"CVE-2016-10228"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-12132"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-25013"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-27618"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5768-1.json"}}],"schema_version":"1.7.5"}