CVE-2015-8984

Priority
Medium
Description
The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22
might allow context-dependent attackers to cause a denial of service
(application crash) via a malformed pattern, which triggers an
out-of-bounds read.
Ubuntu-Description
It was discovered that the fnmatch() function in the GNU C Library did
not properly handle certain malformed patterns. An attacker could use
this to cause a denial of service.
References
Bugs
Package
Upstream:needs-triage
Ubuntu 12.04 LTS (Precise Pangolin):released (2.15-0ubuntu10.16)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.19-0ubuntu6.10)
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 16.10 (Yakkety Yak):DNE
Ubuntu 17.04 (Zesty Zapus):DNE
Package
Source: glibc (LP Ubuntu Debian)
Upstream:released (2.22)
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Touch 15.04:needed
Ubuntu Core 15.04:needed
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.23-0ubuntu3)
Ubuntu 16.10 (Yakkety Yak):not-affected (2.23-0ubuntu3)
Ubuntu 17.04 (Zesty Zapus):not-affected (2.23-0ubuntu3)
Patches:
Upstream:https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
More Information

Updated: 2017-03-22 18:14:19 UTC (commit 12284)