CVE-2009-5155

Priority
Description
In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in
posix/regcomp.c misparses alternatives, which allows attackers to cause a
denial of service (assertion failure and application exit) or trigger an
incorrect result by attempting a regular-expression match.
Notes
Package
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 (Focal Fossa):DNE
Package
Source: glibc (LP Ubuntu Debian)
Upstream:released (2.28-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.04 (Disco Dingo):not-affected (2.29-0ubuntu2)
Ubuntu 19.10 (Eoan Ermine):not-affected (2.29-0ubuntu2)
Ubuntu 20.04 (Focal Fossa):not-affected (2.29-0ubuntu2)
Patches:
Upstream:https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
Package
Upstream:released (20140202+stable-3.2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.04 (Disco Dingo):ignored (reached end-of-life)
Ubuntu 19.10 (Eoan Ermine):not-affected (20140202+stable-4)
Ubuntu 20.04 (Focal Fossa):not-affected (20140202+stable-4)
Patches:
Upstream:http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
More Information

Updated: 2020-01-23 20:14:58 UTC (commit b4629892d998f2ede31f59bb7508dc50a92ac664)