CVE-2018-11236
18.05.2018, 16:29
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | glibc | 𝑥 ≤ 2.27 |
redhat | virtualization_host | 4.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_workstation | 7.0 |
oracle | communications_session_border_controller | 8.0.0 |
oracle | communications_session_border_controller | 8.1.0 |
oracle | communications_session_border_controller | 8.2.0 |
oracle | enterprise_communications_broker | 3.0.0 |
oracle | enterprise_communications_broker | 3.1.0 |
netapp | data_ontap_edge | - |
netapp | element_software_management | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
eglibc |
| ||||||||||||||||||||||||||||||||
glibc |
|
References