First published: Fri Jan 12 2018(Updated: )
A buffer underflow in realpath() in glibc when getcwd() returns relative path or unreachable path (i.e. not starting with '/') was found that can allow privilege escalation under certain conditions. Reference: <a href="http://www.openwall.com/lists/oss-security/2018/01/11/5">http://www.openwall.com/lists/oss-security/2018/01/11/5</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <=2.26 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u8 2.36-9+deb12u7 2.40-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000001 is a vulnerability in glibc 2.26 and earlier that allows for buffer underflow and potential code execution.
The severity of CVE-2018-1000001 is high, with a severity value of 7.8.
The software affected by CVE-2018-1000001 includes glibc versions 2.28-10+deb10u1, 2.28-10+deb10u2, 2.31-13+deb11u6, 2.31-13+deb11u7, 2.36-9+deb12u2, 2.36-9+deb12u3, and 2.37-12.
To fix CVE-2018-1000001, update glibc to version 2.26 or later.
You can find more information about CVE-2018-1000001 at the following references: [Link 1](http://seclists.org/oss-sec/2018/q1/38), [Link 2](http://www.securityfocus.com/bid/102525), [Link 3](http://www.securitytracker.com/id/1040162).