Lucene search

K
mageiaGentoo FoundationMGASA-2014-0496
HistoryNov 26, 2014 - 8:29 p.m.

Updated glibc packages fix CVE-2014-7817

2014-11-2620:29:06
Gentoo Foundation
advisories.mageia.org
9

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

21.7%

The function wordexp() fails to properly handle the WRDE_NOCMD flag when processing arithmetic inputs in the form of “$((… ``))” where “…” can be anything valid. The backticks in the arithmetic epxression are evaluated by in a shell even if WRDE_NOCMD forbade command substitution. This allows an attacker to attempt to pass dangerous commands via constructs of the above form, and bypass the WRDE_NOCMD flag. This update fixes the issue (CVE-2014-7817).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchglibc< 2.17-7.6glibc-2.17-7.6.mga3
Mageia4noarchglibc< 2.18-9.5glibc-2.18-9.5.mga4

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

21.7%