{"id":"USN-6736-2","summary":"klibc vulnerabilities","details":"USN-6736-1 fixed vulnerabilities in klibc. This update provides the\ncorresponding updates for Ubuntu 24.04 LTS.\n\nOriginal advisory details:\n\n It was discovered that zlib, vendored in klibc, incorrectly handled pointer\n arithmetic. An attacker could use this issue to cause klibc to crash or to\n possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841)\n \n Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled\n memory when performing certain deflating operations. An attacker could use\n this issue to cause klibc to crash or to possibly execute arbitrary code.\n (CVE-2018-25032)\n \n Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled\n memory when performing certain inflate operations. An attacker could use\n this issue to cause klibc to crash or to possibly execute arbitrary code.\n (CVE-2022-37434)\n","modified":"2026-02-10T04:43:40Z","published":"2024-05-23T09:28:52Z","related":["UBUNTU-CVE-2016-9840","UBUNTU-CVE-2016-9841","UBUNTU-CVE-2018-25032","UBUNTU-CVE-2022-37434"],"upstream":["CVE-2016-9840","CVE-2016-9841","CVE-2018-25032","CVE-2022-37434","UBUNTU-CVE-2016-9840","UBUNTU-CVE-2016-9841","UBUNTU-CVE-2018-25032","UBUNTU-CVE-2022-37434"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6736-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9840"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9841"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-25032"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-37434"}],"affected":[{"package":{"name":"klibc","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/klibc@2.0.13-4ubuntu0.1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.13-4ubuntu0.1"}]}],"versions":["2.0.13-1","2.0.13-2","2.0.13-2ubuntu1","2.0.13-4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2.0.13-4ubuntu0.1","binary_name":"klibc-utils"},{"binary_version":"2.0.13-4ubuntu0.1","binary_name":"libklibc"},{"binary_version":"2.0.13-4ubuntu0.1","binary_name":"libklibc-dev"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2016-9840","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-9841","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-25032","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-37434","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:24.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6736-2.json"}}],"schema_version":"1.7.3"}