CVE-2018-1000001
31.01.2018, 14:29
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | glibc | 𝑥 ≤ 2.26 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.10 |
redhat | virtualization_host | 4.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_eus | 7.6 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
dietlibc |
| ||||||||||||||||
eglibc |
| ||||||||||||||||
glibc |
| ||||||||||||||||
musl |
|
Common Weakness Enumeration
References