The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
2021-07-22T18:15:23.287
2025-05-01T18:10:02.587
Analyzed
CVSSv3.1: 9.1 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:N/A:P
10.0
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gnu | glibc | < 2.31 | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |
Application | netapp | e-series_santricity_os_controller | ≤ 11.70.1 | Yes |
Application | netapp | hci_management_node | - | Yes |
Application | netapp | ontap_select_deploy_administration_utility | - | Yes |
Application | netapp | solidfire | - | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |