Vulnerability Description
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | <= 2.27 |
| Redhat | Virtualization Host | 4.0 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Workstation | 7.0 |
| Oracle | Communications Session Border Controller | 8.0.0 |
| Oracle | Enterprise Communications Broker | 3.0.0 |
| Netapp | Data Ontap Edge | - |
| Netapp | Element Software Management | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104255Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHBA-2019:0327Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3092PatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20190329-0001/Broken Link
- https://security.netapp.com/advisory/ntap-20190401-0001/Third Party Advisory
- https://sourceware.org/bugzilla/show_bug.cgi?id=22786Issue TrackingThird Party Advisory
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895e
- https://usn.ubuntu.com/4416-1/
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlPatchThird Party Advisory
- http://www.securityfocus.com/bid/104255Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHBA-2019:0327Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3092PatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20190329-0001/Broken Link
- https://security.netapp.com/advisory/ntap-20190401-0001/Third Party Advisory
- https://sourceware.org/bugzilla/show_bug.cgi?id=22786Issue TrackingThird Party Advisory
FAQ
What is CVE-2018-11236?
CVE-2018-11236 is a vulnerability with a CVSS score of 9.8 (CRITICAL). stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit a...
How severe is CVE-2018-11236?
CVE-2018-11236 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-11236?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc, Redhat Virtualization Host, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation.