The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3152-1 | glibc security update |
EUVD |
EUVD-2021-22577 | The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations. |
Ubuntu USN |
USN-5310-1 | GNU C Library vulnerabilities |
Ubuntu USN |
USN-5699-1 | GNU C Library vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 13 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-704 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-13T20:00:38.638Z
Reserved: 2021-06-29T00:00:00.000Z
Link: CVE-2021-35942
Updated: 2024-08-04T00:40:47.554Z
Status : Modified
Published: 2021-07-22T18:15:23.287
Modified: 2026-02-13T21:16:11.310
Link: CVE-2021-35942
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN