SB2015022709 - Fedora 21 update for glibc



SB2015022709 - Fedora 21 update for glibc

Published: February 27, 2015 Updated: June 28, 2025

Security Bulletin ID SB2015022709
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2014-7817)

The vulnerability allows a local user to read and manipulate data.

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".


2) Infinite loop (CVE-ID: CVE-2014-9402)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the nss_dns implementation of getnetbyname due to infinite loop when the DNS backend in the Name Service Switch configuration is enabled. A remote attacker can send a positive answer while a network name is being process and cause the service to crash.

3) Buffer overflow (CVE-ID: CVE-2015-1472)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.


Remediation

Install update from vendor's website.