CVE-2021-35942
📋 TL;DR
This vulnerability in glibc's wordexp function allows attackers to cause denial of service or potentially read arbitrary memory when processing malicious input. It affects any application using glibc's wordexp function with untrusted input. Systems running vulnerable glibc versions are at risk.
💻 Affected Systems
- GNU C Library (glibc)
📦 What is this software?
E Series Santricity Os Controller by Netapp
Glibc by Gnu
The GNU C Library (glibc) is the core C library for Linux systems, providing essential system calls and basic functions for all C programs. It is a fundamental component that nearly every Linux application depends on.
Learn more about Glibc →Ontap Select Deploy Administration Utility by Netapp
View all CVEs affecting Ontap Select Deploy Administration Utility →
Solidfire by Netapp
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution or sensitive memory disclosure leading to complete system compromise
Likely Case
Application crash causing denial of service, potentially with some memory disclosure
If Mitigated
No impact if applications don't use wordexp with untrusted input or if proper input validation is implemented
🎯 Exploit Status
Proof of concept demonstrates crash/DoS. Memory disclosure requires more sophisticated exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: glibc 2.34 and later
Vendor Advisory: https://sourceware.org/bugzilla/show_bug.cgi?id=28011
Restart Required: Yes
Instructions:
1. Update glibc package using your distribution's package manager. 2. For Debian/Ubuntu: sudo apt update && sudo apt upgrade libc6. 3. For RHEL/CentOS: sudo yum update glibc. 4. Restart affected services or reboot system.
🔧 Temporary Workarounds
Input validation
allValidate and sanitize all input before passing to wordexp function
Application hardening
linuxUse seccomp or other sandboxing to restrict wordexp usage
🧯 If You Can't Patch
- Audit applications for wordexp usage and restrict untrusted input
- Implement network segmentation and limit exposure of vulnerable applications
🔍 How to Verify
Check if Vulnerable:
Check glibc version: ldd --version | head -1
Check Version:
ldd --version | head -1
Verify Fix Applied:
Verify glibc version is 2.34 or later: ldd --version | head -1
📡 Detection & Monitoring
Log Indicators:
- Application crashes with segmentation faults
- Unexpected memory access patterns
Network Indicators:
- Unusual patterns of input to applications using wordexp
SIEM Query:
source="application_logs" AND ("segmentation fault" OR "wordexp" OR "glibc crash")
🔗 References
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security.gentoo.org/glsa/202208-24
- https://security.netapp.com/advisory/ntap-20210827-0005/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28011
- https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
- https://sourceware.org/glibc/wiki/Security%20Exceptions
- https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
- https://security.gentoo.org/glsa/202208-24
- https://security.netapp.com/advisory/ntap-20210827-0005/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28011
- https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
- https://sourceware.org/glibc/wiki/Security%20Exceptions