Description
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
References (11)
Core 11
Core References
Patch x_refsource_misc
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
Broken Link vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/107160
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202006-04
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4416-1/
Third Party Advisory x_refsource_confirm
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
Not Applicable x_refsource_misc
https://www.oracle.com/security-alerts/cpuapr2022.html
Patch, Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20190315-0002/
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
Exploit, Mailing List, Vendor Advisory x_refsource_misc
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
Exploit, Mailing List, Vendor Advisory x_refsource_misc
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
Third Party Advisory x_refsource_confirm
https://support.f5.com/csp/article/K54823184
Scores
CVSS v3
9.8
EPSS
0.0708
EPSS Percentile
91.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-125
Status
published
Products (8)
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
19.10
gnu/glibc
< 2.29
mcafee/web_gateway
7.7.2.0 - 7.7.2.21
netapp/cloud_backup
netapp/ontap_select_deploy_administration_utility
netapp/steelstore_cloud_integrated_storage
Published
Feb 26, 2019
Tracked Since
Feb 18, 2026