Back to bug 2217330
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Avinash Hanwate | 2023-06-26 05:38:13 UTC | Depends On | 2217331, 2217332, 2217333 | |
| Avinash Hanwate | 2023-06-26 05:39:33 UTC | Blocks | 2217334 | |
| Florian Weimer | 2023-06-26 07:12:58 UTC | Link ID | Sourceware 18036 | |
| Sandipan Roy | 2023-06-26 07:25:37 UTC | Summary | TRIAGE-CVE-2015-20109 glibc: denial of service | CVE-2015-20109 glibc: denial of service |
| Alias | TRIAGE-CVE-2015-20109 | CVE-2015-20109 | ||
| Sandipan Roy | 2023-06-26 07:26:36 UTC | Summary | CVE-2015-20109 glibc: denial of service | CVE-2015-20109 glibc: buffer overflow (read past end of buffer) in internal_fnmatch=>end_pattern with "**(!()" pattern |
| Sandipan Roy | 2023-06-26 07:51:12 UTC | Doc Text | A vulnerability was found in the GNU C Library (aka glibc). The end_pattern (called from internal_fnmatch) might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. | |
| Product Security DevOps Team | 2023-06-26 11:33:17 UTC | Resolution | --- | NOTABUG |
| Status | NEW | CLOSED | ||
| Last Closed | 2023-06-26 11:33:17 UTC | |||
| RaTasha Tillery-Smith | 2023-06-26 13:04:24 UTC | Doc Text | A vulnerability was found in the GNU C Library (aka glibc). The end_pattern (called from internal_fnmatch) might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. | A vulnerability was found in the GNU C Library (glibc). The end_pattern (called from internal_fnmatch) might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by the use of the fnmatch library function with the **(!() pattern. |
Back to bug 2217330