MGASA-2014-0496

Source
https://advisories.mageia.org/MGASA-2014-0496.html
Import Source
https://advisories.mageia.org/MGASA-2014-0496.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0496
Related
Published
2014-11-26T17:29:06Z
Modified
2014-11-26T17:12:23Z
Summary
Updated glibc packages fix CVE-2014-7817
Details

The function wordexp() fails to properly handle the WRDENOCMD flag when processing arithmetic inputs in the form of "$((... ``))" where "..." can be anything valid. The backticks in the arithmetic epxression are evaluated by in a shell even if WRDENOCMD forbade command substitution. This allows an attacker to attempt to pass dangerous commands via constructs of the above form, and bypass the WRDE_NOCMD flag. This update fixes the issue (CVE-2014-7817).

References
Credits

Affected packages

Mageia:4 / glibc

Package

Name
glibc
Purl
pkg:rpm/mageia/glibc?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.18-9.5.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / glibc

Package

Name
glibc
Purl
pkg:rpm/mageia/glibc?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.17-7.6.mga3

Ecosystem specific

{
    "section": "core"
}