CVE-2019-9169 — Out-of-bounds Read in Glibc
Severity
9.8CRITICALNVD
EPSS
7.1%
top 8.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 26
Latest updateMay 13
Description
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
Also affects: Ubuntu Linux 16.04, 18.04, 19.10
Patches
🔴Vulnerability Details
3📋Vendor Advisories
4Microsoft▶
In the GNU C Library (aka glibc or libc6) through 2.29 proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.↗2019-02-12
Red Hat▶
glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-read↗2019-01-20
Debian▶
CVE-2019-9169: glibc - In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in pos...↗2019