{"id":"USN-6541-2","summary":"glibc regression","details":"USN-6541-1 fixed vulnerabilities in the GNU C Library. Unfortunately,\nchanges made to allow proper application of the fix for CVE-2023-4806 in\nUbuntu 22.04 LTS introduced an issue in the NSCD service IPv6 processing\nfunctionalities. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\n It was discovered that the GNU C Library was not properly handling certain\n memory operations. An attacker could possibly use this issue to cause a\n denial of service (application crash). (CVE-2023-4806, CVE-2023-4813)\n \n It was discovered that the GNU C library was not properly implementing a\n fix for CVE-2023-4806 in certain cases, which could lead to a memory leak.\n An attacker could possibly use this issue to cause a denial of service\n (application crash). This issue only affected Ubuntu 22.04 LTS and Ubuntu\n 23.04. (CVE-2023-5156)\n","modified":"2026-02-10T04:43:27Z","published":"2024-01-10T13:10:15Z","related":["UBUNTU-CVE-2023-4806","UBUNTU-CVE-2023-4813","UBUNTU-CVE-2023-5156"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6541-2"},{"type":"REPORT","url":"https://launchpad.net/bugs/2047155"}],"affected":[{"package":{"name":"glibc","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/glibc@2.35-0ubuntu3.6?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.35-0ubuntu3.6"}]}],"versions":["2.34-0ubuntu3","2.35-0ubuntu1","2.35-0ubuntu3","2.35-0ubuntu3.1","2.35-0ubuntu3.3","2.35-0ubuntu3.4","2.35-0ubuntu3.5"],"ecosystem_specific":{"binaries":[{"binary_version":"2.35-0ubuntu3.6","binary_name":"glibc-source"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc-bin"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc-dev-bin"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc-devtools"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6-amd64"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6-dev"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6-dev-amd64"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6-dev-i386"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6-dev-s390"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6-dev-x32"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6-i386"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6-prof"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6-s390"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"libc6-x32"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"locales"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"locales-all"},{"binary_version":"2.35-0ubuntu3.6","binary_name":"nscd"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6541-2.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[]}}}],"schema_version":"1.7.3"}