CVE-2018-11236

Updated: 2025-08-20 02:58:31.384266

Description:

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x HIGH 7.5
CVSS Version 3.x CRITICAL 9.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU glibc 2.34 9.8 CRITICAL Already Fixed 2024-05-09 10:07:27
CentOS 6 ELS glibc 2.12 9.8 CRITICAL Released CLSA-2024:1717694505 2024-06-15 11:26:46
CentOS 7 ELS glibc 2.17 9.8 CRITICAL Already Fixed 2024-05-22 17:21:28
CentOS 8.4 ELS glibc 2.28 9.8 CRITICAL Already Fixed 2024-05-09 10:07:27
CentOS 8.5 ELS glibc 2.28 9.8 CRITICAL Already Fixed 2024-05-09 10:07:27
CloudLinux 6 ELS glibc 2.12 9.8 CRITICAL Released CLSA-2024:1717693595 2024-06-15 11:26:45
Oracle Linux 6 ELS glibc 2.12 9.8 CRITICAL Released CLSA-2024:1717694198 2024-06-06 14:23:02
Ubuntu 16.04 ELS glibc 2.23-0 9.8 CRITICAL Already Fixed 2024-05-08 10:14:19
Ubuntu 18.04 ELS glibc 2.27-3 9.8 CRITICAL Already Fixed 2024-05-08 10:14:19