First published: Fri Jan 12 2018(Updated: )
A buffer underflow in realpath() in glibc when getcwd() returns relative path or unreachable path (i.e. not starting with '/') was found that can allow privilege escalation under certain conditions. Reference: <a href="http://www.openwall.com/lists/oss-security/2018/01/11/5">http://www.openwall.com/lists/oss-security/2018/01/11/5</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1533836 is considered critical due to its potential for privilege escalation.
To fix REDHAT-BUG-1533836, you should update the GNU C Library (glibc) to the latest patched version available.
REDHAT-BUG-1533836 is caused by a buffer underflow in the realpath() function when getcwd() returns specific types of paths.
Users of GNU glibc are primarily affected by REDHAT-BUG-1533836, especially in environments where relative paths are used.
Yes, under certain conditions, REDHAT-BUG-1533836 can be exploited to gain elevated privileges on vulnerable systems.