The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Glibc | Gnu | * | 2.28 (excluding) |
Eglibc | Ubuntu | precise | * |
Eglibc | Ubuntu | precise/esm | * |
Eglibc | Ubuntu | trusty | * |
Eglibc | Ubuntu | trusty/esm | * |
Eglibc | Ubuntu | upstream | * |
Glibc | Ubuntu | artful | * |
Glibc | Ubuntu | bionic | * |
Glibc | Ubuntu | esm-infra/bionic | * |
Glibc | Ubuntu | esm-infra/xenial | * |
Glibc | Ubuntu | upstream | * |
Glibc | Ubuntu | vivid/stable-phone-overlay | * |
Glibc | Ubuntu | vivid/ubuntu-core | * |
Glibc | Ubuntu | xenial | * |
Glibc | Ubuntu | yakkety | * |
Glibc | Ubuntu | zesty | * |