A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
2020-04-30T17:15:13.067
2024-11-21T05:11:18.623
Modified
CVSSv3.1: 7.0 (HIGH)
AV:L/AC:H/Au:N/C:P/I:P/A:P
1.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gnu | glibc | < 2.32.0 | Yes |
Operating System | canonical | ubuntu_linux | 16.04 | Yes |
Operating System | canonical | ubuntu_linux | 18.04 | Yes |
Operating System | canonical | ubuntu_linux | 19.10 | Yes |
Application | netapp | active_iq_unified_manager | ≥ 9.5 | Yes |
Application | netapp | hci_management_node | - | Yes |
Application | netapp | solidfire | - | Yes |
Application | netapp | steelstore_cloud_integrated_storage | - | Yes |
Operating System | netapp | h410c_firmware | - | Yes |
Hardware | netapp | h410c | - | No |
Operating System | debian | debian_linux | 10.0 | Yes |