Description
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3152-1 | glibc security update |
EUVD |
EUVD-2021-22577 | The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations. |
Ubuntu USN |
USN-5310-1 | GNU C Library vulnerabilities |
Ubuntu USN |
USN-5699-1 | GNU C Library vulnerabilities |
References
History
Fri, 13 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-704 | |
| Metrics |
ssvc
|
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Gnu
Subscribe
Glibc
Subscribe
Netapp
Subscribe
Active Iq Unified Manager
Subscribe
E-series Santricity Os Controller
Subscribe
Hci Management Node
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Solidfire
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-13T20:00:38.638Z
Reserved: 2021-06-29T00:00:00.000Z
Link: CVE-2021-35942
Updated: 2024-08-04T00:40:47.554Z
Status : Modified
Published: 2021-07-22T18:15:23.287
Modified: 2026-02-13T21:16:11.310
Link: CVE-2021-35942
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN