The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T00:40:47.554Z

Reserved: 2021-06-29T00:00:00

Link: CVE-2021-35942

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-07-22T18:15:23.287

Modified: 2025-05-01T18:10:02.587

Link: CVE-2021-35942

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-06-30T00:00:00Z

Links: CVE-2021-35942 - Bugzilla

cve-icon OpenCVE Enrichment

No data.