Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3152-1 | glibc security update |
EUVD |
EUVD-2021-22577 | The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations. |
Ubuntu USN |
USN-5310-1 | GNU C Library vulnerabilities |
Ubuntu USN |
USN-5699-1 | GNU C Library vulnerabilities |
Fri, 13 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-704 | |
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-13T20:00:38.638Z
Reserved: 2021-06-29T00:00:00.000Z
Link: CVE-2021-35942
Updated: 2024-08-04T00:40:47.554Z
Status : Modified
Published: 2021-07-22T18:15:23.287
Modified: 2026-02-13T21:16:11.310
Link: CVE-2021-35942
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN