vulnerability
SUSE: CVE-2021-35942: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | Jul 22, 2021 | Jul 28, 2021 | Oct 26, 2022 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Jul 22, 2021
Added
Jul 28, 2021
Modified
Oct 26, 2022
Description
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
Solutions
suse-upgrade-glibcsuse-upgrade-glibc-32bitsuse-upgrade-glibc-develsuse-upgrade-glibc-devel-32bitsuse-upgrade-glibc-devel-staticsuse-upgrade-glibc-devel-static-32bitsuse-upgrade-glibc-extrasuse-upgrade-glibc-htmlsuse-upgrade-glibc-i18ndatasuse-upgrade-glibc-infosuse-upgrade-glibc-langsuse-upgrade-glibc-localesuse-upgrade-glibc-locale-32bitsuse-upgrade-glibc-locale-basesuse-upgrade-glibc-locale-base-32bitsuse-upgrade-glibc-profilesuse-upgrade-glibc-profile-32bitsuse-upgrade-glibc-utilssuse-upgrade-glibc-utils-32bitsuse-upgrade-nscd
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.