Integer Overflow or Wraparound
CVE-2021-35942
Summary
The "wordexp" function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in "parse_param" (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because "atoi" was used but "strtoul" should have been used to ensure correct calculations.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- HIGH
- HIGH
CWE-190 - Integer Overflow or Wraparound
The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Advisory Timeline
- Published