CVE-2014-9761

Priority
Description
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or
libc6) before 2.23 allow context-dependent attackers to cause a denial of
service (application crash) or possibly execute arbitrary code via a long
argument to the (1) nan, (2) nanf, or (3) nanl function.
Ubuntu-Description
Joseph Myers discovered that the GNU C Library did not properly
handle long arguments to functions returning a representation of
Not a Number (NaN). An attacker could use this to cause a denial
of service (stack exhaustion leading to an application crash) or
possibly execute arbitrary code.
Notes
 tyhicks> USN-2985-1 initially fixed this issue but it caused a regression and
  the change was backed out by USN-2985-2. This issue will be fixed in a future
  update.
Package
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Package
Source: glibc (LP Ubuntu Debian)
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.23-0ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.23-0ubuntu1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (2.23-0ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (2.23-0ubuntu1)
Patches:
Upstream:https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=e02cabecf0d025ec4f4ddee290bdf7aadb873bb3
Upstream:https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=8f5e8b01a1da2a207228f2072c934fa5918554b8
More Information

Updated: 2019-01-14 21:16:25 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)