Out-of-bounds Write Affecting glibc-utils package, versions <0:2.28-127.el8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-GLIBCUTILS-2057357
- published 26 Jul 2021
- disclosed 20 Jan 2020
Introduced: 20 Jan 2020
CVE-2020-1751 Open this link in a new tabHow to fix?
Upgrade Centos:8 glibc-utils to version 0:2.28-127.el8 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc-utils package and not the glibc-utils package as distributed by Centos.
See How to fix? for Centos:8 relevant fixed versions and status.
An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
- https://security.netapp.com/advisory/ntap-20200430-0002/
- https://access.redhat.com/security/cve/CVE-2020-1751
- https://security.gentoo.org/glsa/202006-04
- https://sourceware.org/bugzilla/show_bug.cgi?id=25423
- https://access.redhat.com/errata/RHSA-2020:4444
- https://usn.ubuntu.com/4416-1/