This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug libc/23345] New: Usages of realpath() are subject to bufferoverflows()


https://sourceware.org/bugzilla/show_bug.cgi?id=23345

            Bug ID: 23345
           Summary: Usages of realpath() are subject to bufferoverflows()
           Product: glibc
           Version: 2.29
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: libc
          Assignee: unassigned at sourceware dot org
          Reporter: mishra.dhiraj95 at gmail dot com
                CC: drepper.fsp at gmail dot com
  Target Milestone: ---

Created attachment 11102
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11102&action=edit
Please advise for point 1. in the given txt which FB security replied on
CVE-2018-1000001

Hi Team, 

Few days back I reported a issue in Facebook WDT
(https://github.com/facebook/wdt/).

However I am at stage where FB security team says it would be a glibc bug that
affected WDT, I have added a .txt file which contains entire communication
which happened.

Request `glibc` team to please have a look and advise for same that would
probably help me.


Cheers, Dhiraj

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]