In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
www.securityfocus.com/bid/107160
debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
kc.mcafee.com/corporate/index?page=content&id=SB10278
security.gentoo.org/glsa/202006-04
security.netapp.com/advisory/ntap-20190315-0002/
sourceware.org/bugzilla/show_bug.cgi?id=24114
sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
support.f5.com/csp/article/K54823184
usn.ubuntu.com/4416-1/
www.oracle.com/security-alerts/cpuapr2022.html