This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug libc/23345] Usages of realpath() are subject to bufferoverflows()
- From: "mishra.dhiraj95 at gmail dot com" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Thu, 28 Jun 2018 05:42:10 +0000
- Subject: [Bug libc/23345] Usages of realpath() are subject to bufferoverflows()
- Auto-submitted: auto-generated
- References: <bug-23345-131@http.sourceware.org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=23345
--- Comment #2 from Dhiraj <mishra.dhiraj95 at gmail dot com> ---
(In reply to Dmitry V. Levin from comment #1)
> (In reply to Dhiraj from comment #0)
> > Created attachment 11102 [details]
> > Please advise for point 1.
>
> bugzilla is not the best place to look for advise.
>
> > in the given txt which FB security replied on CVE-2018-1000001
>
> CVE-2018-1000001 was fixed in glibc-2.27, see
> https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2018-1000001
This was regarding a security issue in glibc (FB security team says it would be
a glibc bug that affected facebook WDT.
--
You are receiving this mail because:
You are on the CC list for the bug.