stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| gnu | glibc | 2.27 | - |
| redhat | virtualization_host | - | - |
| redhat | enterprise_linux_desktop | - |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
12
Affected Products
18
References
gnu / glibc
| - |
| redhat | enterprise_linux_server | - | - |
| redhat | enterprise_linux_workstation | - | - |
| oracle | communications_session_border_controller | - | - |
| oracle | communications_session_border_controller | - | - |
| oracle | communications_session_border_controller | - | - |
| oracle | enterprise_communications_broker | - | - |
| oracle | enterprise_communications_broker | - | - |
| netapp | data_ontap_edge | - | - |
| netapp | element_software_management | - | - |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact