Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-10029

Опубликовано: 12 фев. 2020
Источник: redhat
CVSS3: 5.7
EPSS Низкий

Описание

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.

A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.

Отчет

The glibc version shipped with Red Hat Enterprise Linux 8 is compiled using gcc's stack-protector option which mitigates the possibility of code execution led by the stack corruption. The glibc version shipped with Red Hat Enterprise Linux 7 is more difficult to exploit using this flaw, specifically for remote code execution. Because exploitation of the flaw depends on the usage of pseudo-zero values, an attacker can only overwrite the stack with 0s. Due to this, a valid address value for code execution is difficult to get and is likely to only result in a crash.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5glibcOut of support scope
Red Hat Enterprise Linux 6glibcOut of support scope
Red Hat Enterprise Linux 7glibcFixedRHSA-2021:034802.02.2021
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)glibcFixedRHSA-2021:331531.08.2021
Red Hat Enterprise Linux 7.6 Telco Extended Update SupportglibcFixedRHSA-2021:331531.08.2021
Red Hat Enterprise Linux 7.6 Update Services for SAP SolutionsglibcFixedRHSA-2021:331531.08.2021
Red Hat Enterprise Linux 7.7 Extended Update SupportglibcFixedRHSA-2021:299803.08.2021
Red Hat Enterprise Linux 8glibcFixedRHSA-2020:444404.11.2020
Red Hat Enterprise Linux 8glibcFixedRHSA-2020:444404.11.2020
Red Hat OpenShift Doopenshiftdo/odo-init-image-rhel7FixedRHSA-2021:094922.03.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1810670glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions

EPSS

Процентиль: 13%
0.00044
Низкий

5.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 5 лет назад

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.

CVSS3: 5.5
nvd
больше 5 лет назад

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.

CVSS3: 5.5
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 5.5
debian
больше 5 лет назад

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an o ...

suse-cvrf
около 5 лет назад

Security update for glibc

EPSS

Процентиль: 13%
0.00044
Низкий

5.7 Medium

CVSS3

Уязвимость CVE-2020-10029