This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug libc/23345] Usages of realpath() are subject to bufferoverflows()


https://sourceware.org/bugzilla/show_bug.cgi?id=23345

--- Comment #2 from Dhiraj <mishra.dhiraj95 at gmail dot com> ---
(In reply to Dmitry V. Levin from comment #1)
> (In reply to Dhiraj from comment #0)
> > Created attachment 11102 [details]
> > Please advise for point 1.
> 
> bugzilla is not the best place to look for advise.
> 
> > in the given txt which FB security replied on CVE-2018-1000001
> 
> CVE-2018-1000001 was fixed in glibc-2.27, see
> https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2018-1000001

This was regarding a security issue in glibc (FB security team says it would be
a glibc bug that affected facebook WDT.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]