glibc is vulnerable denial of service. This is an integer overflow flaw in wordexp(), caused by a specially crafted untrusted regular expression input. It can result in arbitrary memory read. The upstream glibc project generally does not consider bugs due to untrusted inputs as security issues, but this is an exception since it invokes undefined behaviour in glibc. In general, use of untrusted regular expression input is strongly discouraged.
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/
access.redhat.com/errata/RHSA-2021:4358
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1977975
lists.debian.org/debian-lts-announce/2022/10/msg00021.html
security.gentoo.org/glsa/202208-24
security.netapp.com/advisory/ntap-20210827-0005/
sourceware.org/bugzilla/show_bug.cgi?id=28011
sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
sourceware.org/glibc/wiki/Security%20Exceptions