[arch-security] [Arch Linux Security Advisory ASA-201411-27] glibc: command execution
Arch Linux Security Advisory ASA-201411-27 ========================================== Severity: Medium Date : 2014-11-21 CVE-ID : CVE-2014-7817 Package : glibc Type : command execution Remote : No Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package glibc before version 2.20-3 is vulnerable to command execution. Resolution ========== Upgrade to 2.20-3. # pacman -Syu "glibc>=2.20-3" The problem has been fixed upstream but there has been no new release yet. Workaround ========== None. Description =========== The wordexp function could ignore the WRDE_NOCMD flag under certain input conditions resulting in the execution of a shell for command substitution when the application did not request it. The implementation now checks WRDE_NOCMD immediately before executing the shell and returns the error WRDE_CMDSUB as expected. Impact ====== An attacker may be able to force arbitrary commands to be executed by an application using the wordexp function. References ========== https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7817 https://sourceware.org/bugzilla/show_bug.cgi?id=17625 http://seclists.org/oss-sec/2014/q4/730
participants (1)
-
Remi Gacogne