Vulnerability Description
In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\1\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | <= 2.29 |
Related Weaknesses (CWE)
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=24269ExploitIssue TrackingThird Party Advisory
- https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medi
- https://sourceware.org/bugzilla/show_bug.cgi?id=24269ExploitIssue TrackingThird Party Advisory
- https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medi
FAQ
What is CVE-2019-9192?
CVE-2019-9192 is a vulnerability with a CVSS score of 7.5 (HIGH). In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\1\\1)*' in grep, a different issue than CVE...
How severe is CVE-2019-9192?
CVE-2019-9192 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9192?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc.