Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2014-7817

Published: 24 November 2014

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

Priority

Medium

Status

Package Release Status
eglibc
Launchpad, Ubuntu, Debian
lucid
Released (2.11.1-0ubuntu7.19)
precise
Released (2.15-0ubuntu10.9)
trusty
Released (2.19-0ubuntu6.4)
upstream Needs triage

utopic Does not exist

glibc
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

utopic
Released (2.19-10ubuntu2.1)
Patches:
upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=33ceaf6187b31ea15284ac65131749e1cb68d2ae
upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c (trunk)
upstream: http://www.openwall.com/lists/oss-security/2014/11/20/36