Summary: | <sys-libs/glibc-2.20-r2: command execution in wordexp() with WRDE_NOCMD specified (CVE-2014-7817) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | gentoo.org, gentoo, toolchain |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c | ||
See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1157689 | ||
Whiteboard: | A2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 516884 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2014-11-20 18:49:25 UTC
CVE-2014-7817 and thus common knowledge, please add the patch shown in https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html until a new upstream release is around. CVE-2014-7817 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7817): The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))". fix is also in glibc-2.20-r2 now This issue was resolved and addressed in GLSA 201602-02 at https://security.gentoo.org/glsa/201602-02 by GLSA coordinator Tobias Heinlein (keytoaster). |