{"id":"UBUNTU-CVE-2015-20109","details":"end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CVE-2015-8984; also, some Linux distributions have fixed CVE-2015-8984 but have not fixed this additional fnmatch issue.","modified":"2026-02-04T03:02:29.528708Z","published":"2023-06-25T17:15:00Z","related":["USN-6762-1"],"upstream":["CVE-2015-20109"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-20109"},{"type":"REPORT","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18036"},{"type":"REPORT","url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=c2c6d39fab901c97c18fa3a3a3658d9dc3f7df61"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-20109"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6762-1"}],"affected":[{"package":{"name":"eglibc","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/eglibc@2.19-0ubuntu6.15+esm3?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.19-0ubuntu6.15+esm3"}]}],"versions":["2.17-93ubuntu4","2.18-0ubuntu1","2.18-0ubuntu2","2.18-0ubuntu4","2.18-0ubuntu5","2.18-0ubuntu6","2.18-0ubuntu7","2.19-0ubuntu2","2.19-0ubuntu3","2.19-0ubuntu4","2.19-0ubuntu5","2.19-0ubuntu6","2.19-0ubuntu6.1","2.19-0ubuntu6.3","2.19-0ubuntu6.4","2.19-0ubuntu6.5","2.19-0ubuntu6.6","2.19-0ubuntu6.7","2.19-0ubuntu6.8","2.19-0ubuntu6.9","2.19-0ubuntu6.10","2.19-0ubuntu6.11","2.19-0ubuntu6.13","2.19-0ubuntu6.14","2.19-0ubuntu6.15","2.19-0ubuntu6.15+esm1","2.19-0ubuntu6.15+esm2"],"ecosystem_specific":{"binaries":[{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"eglibc-source"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc-bin"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc-dev-bin"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-amd64"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-armel"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-dev"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-dev-amd64"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-dev-armel"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-dev-i386"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-dev-x32"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-i386"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-pic"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-prof"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"libc6-x32"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"multiarch-support"},{"binary_version":"2.19-0ubuntu6.15+esm3","binary_name":"nscd"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-20109.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}