stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
Priority: MEDIUM
CVSS v3: 9.8
Component: glibc
Publish Date: May 18, 2018
Related ID: --
CVSS v2: CRITICAL
Modified Date: May 25, 2018
Find out more about CVE-2018-11236 from the MITRE-CVE dictionary and NIST NVD
Login may be required to access defects or downloads.
Product Name |
Status |
Defect |
Fixed |
Downloads |
Notes
Requires LTSS - customers must have active LTSS (Long Term Security Shield) Support to receive up-to-date information about vulnerabilities that may affect legacy software. Please contact your Wind River account team or see https://docs.windriver.com/bundle/Support_and_Maintenance_Supplemental_Terms_and_Conditions and https://support2.windriver.com/index.php?page=plc for more information.