CVE-2015-8984

Priority
Description
The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22
might allow context-dependent attackers to cause a denial of service
(application crash) via a malformed pattern, which triggers an
out-of-bounds read.
Ubuntu-Description
It was discovered that the fnmatch() function in the GNU C Library did
not properly handle certain malformed patterns. An attacker could use
this to cause a denial of service.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (2.15-0ubuntu10.16)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.19-0ubuntu6.10)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Source: glibc (LP Ubuntu Debian)
Upstream:released (2.22)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.23-0ubuntu3)
Patches:
Upstream:https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
More Information

Updated: 2019-03-19 12:24:32 UTC (commit 15472795df7e9de45b82f2d36b8b419b939f97b2)