CVE-2019-9169

Published: 26 February 2019

In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.

Priority

Low

CVSS 3 base score: 9.8

Status

Package Release Status
eglibc
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable

Patches:
Upstream: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=583dd860d5b833037175247230a328f0050dbfe9;hp=2bac7daa58da1a313bd452369b0508b31e146637
glibc
Launchpad, Ubuntu, Debian
Upstream
Released (2.30)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(2.30-0ubuntu2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.30-0ubuntu2)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.27-3ubuntu1.2)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (2.23-0ubuntu11.2)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=583dd860d5b833037175247230a328f0050dbfe9 (master)
Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4d0b1b0f61bfba034e9e76a1d76acc59c975238f (2.29)
Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=2aee101ff6075dd97a99982a1ba29e21ec25c52f (2.28)