Users have to upgrade their systems in order to fix the problems

Aug 5, 2014 17:15 GMT  ·  By

Canonical has said that a number of GNU C Library vulnerabilities have been found and corrected in its Ubuntu 14.04 LTS, Ubuntu 12.04 LTS, and Ubuntu 10.04 LTS operating systems.

The developers have identified some security issues with the GNU C Library and an update has been pushed into the repositories.

“Stephane Chazelas discovered that the GNU C Library incorrectly handled locale environment variables. An attacker could use this issue to possibly bypass certain restrictions such as the ForceCommand restrictions in,” reads the security notice.

Also, “David Reid, Glyph Lefkowitz, and Alex Gaynor discovered that the GNU C Library incorrectly handled posix_spawn_file_actions_addopen() path arguments. An attacker could use this issue to cause a denial of service.”

These are just a couple of the vulnerabilities, and for a more detailed description of the problems you can see Canonical's security notification. Users are advised to upgrade their systems as soon as possible.

The flaws can be fixed if you upgrade your system(s) to the latest libc6 packages specific to each distribution. To apply the patch, run the Update Manager application.

In general, a standard system update will make all the necessary changes and you will have to restart the PC or laptop in order to apply the patch.