First published: Fri Apr 17 2020(Updated: )
An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <2.31 | |
Redhat Enterprise Linux | =8.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u8 2.36-9+deb12u7 2.40-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1751 is an out-of-bounds write vulnerability found in glibc before version 2.31 when handling signal trampolines on PowerPC.
CVE-2020-1751 has a severity level of high, with a severity value of 7.
The following software versions are affected: glibc 2.28-10+deb10u1 to 2.28-10+deb10u2, 2.31-13+deb11u6 to 2.31-13+deb11u7, 2.36-9+deb12u2 to 2.36-9+deb12u3, and 2.37-12. Also affected are GNU glibc versions up to 2.31, Redhat Enterprise Linux 8.0, Canonical Ubuntu Linux 16.04, 18.04, and 19.10 with specific versions.
To fix CVE-2020-1751 on Debian, update glibc to versions 2.31-13+deb11u6, 2.31-13+deb11u7, 2.36-9+deb12u2, 2.36-9+deb12u3, or 2.37-12.
To fix CVE-2020-1751 on Ubuntu, update glibc to versions 2.27-3ubuntu1.2 for Ubuntu 16.04 (Xenial), 2.30-0ubuntu2.2 for Ubuntu 18.04 (Bionic), and 2.23-0ubuntu11.2 for Ubuntu 19.10 (Eoan).