CVE-2015-8985
Description
The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A flaw in glibc's pop_fail_stack function during extended regex processing allows denial of service via assertion failure and application crash.
Vulnerability
The pop_fail_stack function in the GNU C Library (glibc) contains an assertion failure that can be triggered during processing of extended regular expressions. This vulnerability affects glibc versions prior to 2.28 [2]. The bug is located in the regex engine and can be reached when an application compiles or executes a crafted regular expression using functions such as regcomp or regexec.
Exploitation
An attacker can exploit this vulnerability by providing a specially crafted extended regular expression to an application that uses glibc's regex functions. No authentication or special privileges are required if the application accepts user-supplied regex patterns. The crafted input causes an assertion failure in pop_fail_stack, leading to an immediate application crash.
Impact
Successful exploitation results in a denial of service (DoS) condition: the affected application crashes due to the assertion failure. There is no evidence of information disclosure, privilege escalation, or remote code execution. The crash is limited to the process handling the malicious regex.
Mitigation
The issue is fixed in glibc version 2.28 and later [2]. Users should upgrade their glibc installation to the latest version. No known workaround exists for unpatched systems. The Gentoo security advisory GLSA 201908-06 recommends upgrading to >=sys-libs/glibc-2.28-r4 [2].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
30- osv-coords28 versionspkg:rpm/suse/glibc&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/glibc&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Micro%205.0pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP2pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/glibc&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/glibc&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/glibc&distro=SUSE%20Manager%20Server%204.1pkg:rpm/suse/glibc&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/glibc&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 2.26-13.65.1+ 27 more
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.22-114.22.1
- (no CPE)range: < 2.22-114.22.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.22-114.22.1
- (no CPE)range: < 2.22-114.22.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.22-114.22.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.26-13.65.1
- (no CPE)range: < 2.22-114.22.1
- (no CPE)range: < 2.22-114.22.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.openwall.com/lists/oss-security/2017/02/14/9nvdMailing ListPatchThird Party Advisory
- www.securityfocus.com/bid/76916nvdThird Party AdvisoryVDB Entry
- bugs.debian.org/cgi-bin/bugreport.cginvdIssue TrackingThird Party Advisory
- security.gentoo.org/glsa/201908-06nvdThird Party Advisory
News mentions
0No linked articles in our index yet.