Hello!
Is the latest uclibc affected by CVE-2018-1000001?
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
Running ltp showed that the test for CVE-2018-1000001 (realpath01) fails.
realpath01.c:30: TFAIL: returned unexpected errno: SUCCESS (0)
https://github.com/linux-test-project/ltp/blob/master/testcases/kernel/sysc…
This cve was fixed in glibc with this commit:
https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2018-1000001
https://github.com/bminor/glibc/commit/52a713fdd0a30e1bd79818e2e3c4ab44ddca…
It looks like the issue is also fixed in uclibc?
https://github.com/wbx-github/uclibc-ng/blob/master/libc/sysdeps/linux/comm…
But maybe uclibc returns a different/wrong return code (SUCCESS) compared to glibc
(ENOENT) in this corner case?
see also glibc commit message
Fix this by checking the path returned by getcwd syscall and falling
back to generic_getcwd if the path is not absolute, effectively making
getcwd(3) fail with ENOENT. The error code is chosen for consistency
with the case when the current directory is unlinked.