stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
Created glibc tracking bugs for this issue:
Affects: fedora-all [bug 1581270]
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2018:3092 https://access.redhat.com/errata/RHSA-2018:3092
Red Hat Product Security has rated this issue as having moderate security impact and a future update may address this flaw.