SB2015022709 - Fedora 21 update for glibc
Published: February 27, 2015 Updated: June 28, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2014-7817)
The vulnerability allows a local user to read and manipulate data.
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
2) Infinite loop (CVE-ID: CVE-2014-9402)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the nss_dns implementation of getnetbyname due to infinite loop when the DNS backend in the Name Service Switch configuration is enabled. A remote attacker can send a positive answer while a network name is being process and cause the service to crash.
3) Buffer overflow (CVE-ID: CVE-2015-1472)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
Remediation
Install update from vendor's website.