The vulnerability is an out-of-bounds read within the ConvertToRegularExpression function in the file src/OpenColorIO/FileRules.cpp. The patch ebdbb75123c9d5f4643e041314e2bc988a13f20d clearly shows the fix. The vulnerable code was calling ThrowInvalidRegex with a pointer globPattern + idx that could read past the end of the globPattern buffer. The index idx is calculated based on the globString, which can have a different length than globPattern, leading to the out-of-bounds access. The fix replaces the incorrect pointer calculation with &globString[idx], which correctly points within the globString. Based on the source code, the function is within the OpenColorIO_v1 namespace. Therefore, any runtime profile during exploitation would show OpenColorIO_v1::ConvertToRegularExpression in the stack trace.