In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| gnu | glibc | 2.29 | - |
| netapp | cloud_backup | - | - |
| netapp | ontap_select_deploy_administration_utility |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10
Affected Products
22
References
gnu / glibc
| - |
| - |
| netapp | steelstore_cloud_integrated_storage | - | - |
| mcafee | web_gateway | 7.7.2.0 - 7.7.2.21 | - |
| mcafee | web_gateway | 7.8.2.0 - 7.8.2.8 | - |
| mcafee | web_gateway | 8.0.0 - 8.1.1 | - |
| canonical | ubuntu_linux | - | - |
| canonical | ubuntu_linux | - | - |
| canonical | ubuntu_linux | - | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact