First published: Tue Feb 26 2019(Updated: )
In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <2.28 | |
Netapp Steelstore Cloud Integrated Storage | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Cloud Backup | ||
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-4 | |
debian/gnulib | 20210102~ebaa53c-1 20230209+stable-1 20240701-1 |
http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-5155 is a vulnerability in the GNU C Library (glibc) before version 2.28.
CVE-2009-5155 has a severity rating of 7.5 (high).
CVE-2009-5155 can cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
To fix CVE-2009-5155, update to GNU C Library version 2.28 or later.
More information about CVE-2009-5155 can be found at the following references: [1] [2] [3].