CVE-2018-11236
18.05.2018, 16:29
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.Enginsight
| Vendor | Product | Version |
|---|---|---|
| gnu | glibc | 𝑥 ≤ 2.27 |
| redhat | virtualization_host | 4.0 |
| redhat | enterprise_linux_desktop | 7.0 |
| redhat | enterprise_linux_server | 7.0 |
| redhat | enterprise_linux_workstation | 7.0 |
| oracle | communications_session_border_controller | 8.0.0 |
| oracle | communications_session_border_controller | 8.1.0 |
| oracle | communications_session_border_controller | 8.2.0 |
| oracle | enterprise_communications_broker | 3.0.0 |
| oracle | enterprise_communications_broker | 3.1.0 |
| netapp | data_ontap_edge | - |
| netapp | element_software_management | - |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| eglibc |
| ||||||||||||||||||||||||||||||||
| glibc |
|
References