stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution. Upstream issue: https://sourceware.org/bugzilla/show_bug.cgi?id=22786 Upstream patch: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2 Product bug: https://bugzilla.redhat.com/show_bug.cgi?id=1579742
Created glibc tracking bugs for this issue: Affects: fedora-all [bug 1581270]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3092 https://access.redhat.com/errata/RHSA-2018:3092
Statement: Red Hat Product Security has rated this issue as having moderate security impact and a future update may address this flaw.