An integer overflow flaw was found in glibc before 2.34 that may result in reading of arbitrary memory when wordexp is used with a specially
crafted untrusted regular expression input.
Created glibc tracking bugs for this issue:
Affects: fedora-all [bug 1977976]
This issue has been addressed in the following products:
Red Hat Enterprise Linux 8
Via RHSA-2021:4358 https://access.redhat.com/errata/RHSA-2021:4358
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):