Red Hat Bugzilla – Bug 1581269
CVE-2018-11236 glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow
Last modified: 2018-10-30 03:36:29 EDT
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution. Upstream issue: https://sourceware.org/bugzilla/show_bug.cgi?id=22786 Upstream patch: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2 Product bug: https://bugzilla.redhat.com/show_bug.cgi?id=1579742
Created glibc tracking bugs for this issue: Affects: fedora-all [bug 1581270]
Statement: Red Hat Product Security has rated this issue as having a security impact of Moderate, and a future update may address this flaw.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3092 https://access.redhat.com/errata/RHSA-2018:3092