Summary: |
CVE-2018-11236 glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow |
Product: |
[Other] Security Response
|
Reporter: |
Andrej Nemec <anemec> |
Component: |
vulnerability | Assignee: |
Red Hat Product Security <security-response-team> |
Status: |
CLOSED
ERRATA
|
QA Contact: |
|
Severity: |
medium
|
Docs Contact: |
|
Priority: |
medium
|
|
|
Version: |
unspecified | CC: |
abhgupta, alanm, aoliva, arjun.is, ashankar, codonell, dbaker, dj, fweimer, glibc-bugzilla, jokerman, law, mfabian, mnewsome, pfrankli, rth, siddhesh, sthangav, trankin, yozone
|
Target Milestone: |
--- | Keywords: |
Security |
Target Release: |
--- | |
|
Hardware: |
All | |
|
OS: |
Linux | |
|
Whiteboard: |
|
Fixed In Version:
|
glibc 2.28
|
Doc Type:
|
If docs needed, set a value
|
Doc Text:
|
|
Story Points:
|
---
|
Clone Of:
|
|
Environment:
|
|
Last Closed:
|
2019-06-10 10:26:11 UTC
|
Type:
|
---
|
Regression:
|
---
|
Mount Type:
|
---
|
Documentation:
|
---
|
CRM:
|
|
Verified Versions:
|
|
Category:
|
---
|
oVirt Team:
|
---
|
RHEL 7.3 requirements from Atomic Host:
|
|
Cloudforms Team:
|
---
|
Target Upstream Version:
|
|
Embargoed:
|
|
| |
Bug Depends On: |
1579742, 1581270, 1581271, 1581881, 1581882, 1582343, 1582344, 1849766
|
|
|
Bug Blocks: |
1581279
|
|
|