The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2017/02/14/9 | mailing list third party advisory patch |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392 | issue tracking third party advisory |
http://www.securityfocus.com/bid/76916 | vdb entry third party advisory |
https://security.gentoo.org/glsa/201908-06 | third party advisory vendor advisory |