This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug libc/23345] New: Usages of realpath() are subject to bufferoverflows()
- From: "mishra.dhiraj95 at gmail dot com" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Wed, 27 Jun 2018 16:40:48 +0000
- Subject: [Bug libc/23345] New: Usages of realpath() are subject to bufferoverflows()
- Auto-submitted: auto-generated
https://sourceware.org/bugzilla/show_bug.cgi?id=23345
Bug ID: 23345
Summary: Usages of realpath() are subject to bufferoverflows()
Product: glibc
Version: 2.29
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: libc
Assignee: unassigned at sourceware dot org
Reporter: mishra.dhiraj95 at gmail dot com
CC: drepper.fsp at gmail dot com
Target Milestone: ---
Created attachment 11102
--> https://sourceware.org/bugzilla/attachment.cgi?id=11102&action=edit
Please advise for point 1. in the given txt which FB security replied on
CVE-2018-1000001
Hi Team,
Few days back I reported a issue in Facebook WDT
(https://github.com/facebook/wdt/).
However I am at stage where FB security team says it would be a glibc bug that
affected WDT, I have added a .txt file which contains entire communication
which happened.
Request `glibc` team to please have a look and advise for same that would
probably help me.
Cheers, Dhiraj
--
You are receiving this mail because:
You are on the CC list for the bug.