Severity
9.8CRITICAL
EPSS
1.0%
top 23.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 18
Latest updateMay 2

Description

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages8 packages

Patches

🔴Vulnerability Details

5
OSV
eglibc, glibc vulnerabilities2024-05-02
GHSA
GHSA-pgv4-4294-ccrq: stdlib/canonicalize2022-05-13
OSV
python-urllib3 vulnerabilities2019-05-21
CVEList
CVE-2018-11236: stdlib/canonicalize2018-05-18
OSV
CVE-2018-11236: stdlib/canonicalize2018-05-18

📋Vendor Advisories

4
Ubuntu
GNU C Library vulnerabilities2024-05-02
Ubuntu
GNU C Library vulnerabilities2020-07-06
Red Hat
glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow2018-02-04
Debian
CVE-2018-11236: glibc - stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier...2018

💬Community

3
Bugzilla
CVE-2018-14939 libreoffice: Use of realpath() in desktop/unx/source/start.c:get_app_path() allows for potential buffer overflow2018-08-09
Bugzilla
CVE-2018-11236 glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow [fedora-all]2018-05-22
Bugzilla
CVE-2018-11236 glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow2018-05-22
CVE-2018-11236 (CRITICAL CVSS 9.8) | stdlib/canonicalize.c in the GNU C | cvebase.io