Total vulnerabilities in the database
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
Software | From | Fixed in |
---|---|---|
gnu / glibc | - | 2.27.x |
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / virtualization_host | 4.0 | 4.0.x |
oracle / enterprise_communications_broker | 3.0.0 | 3.0.0.x |
oracle / enterprise_communications_broker | 3.1.0 | 3.1.0.x |
oracle / communications_session_border_controller | 8.1.0 | 8.1.0.x |
oracle / communications_session_border_controller | 8.2.0 | 8.2.0.x |
oracle / communications_session_border_controller | 8.0.0 | 8.0.0.x |