Back to bug 2217330

Who When What Removed Added
Avinash Hanwate 2023-06-26 05:38:13 UTC Depends On 2217331, 2217332, 2217333
Avinash Hanwate 2023-06-26 05:39:33 UTC Blocks 2217334
Florian Weimer 2023-06-26 07:12:58 UTC Link ID Sourceware 18036
Sandipan Roy 2023-06-26 07:25:37 UTC Summary TRIAGE-CVE-2015-20109 glibc: denial of service CVE-2015-20109 glibc: denial of service
Alias TRIAGE-CVE-2015-20109 CVE-2015-20109
Sandipan Roy 2023-06-26 07:26:36 UTC Summary CVE-2015-20109 glibc: denial of service CVE-2015-20109 glibc: buffer overflow (read past end of buffer) in internal_fnmatch=>end_pattern with "**(!()" pattern
Sandipan Roy 2023-06-26 07:51:12 UTC Doc Text A vulnerability was found in the GNU C Library (aka glibc). The end_pattern (called from internal_fnmatch) might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern.
Product Security DevOps Team 2023-06-26 11:33:17 UTC Resolution --- NOTABUG
Status NEW CLOSED
Last Closed 2023-06-26 11:33:17 UTC
RaTasha Tillery-Smith 2023-06-26 13:04:24 UTC Doc Text A vulnerability was found in the GNU C Library (aka glibc). The end_pattern (called from internal_fnmatch) might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. A vulnerability was found in the GNU C Library (glibc). The end_pattern (called from internal_fnmatch) might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by the use of the fnmatch library function with the **(!() pattern.

Back to bug 2217330