First published: Sat Dec 05 2020(Updated: )
GNU C Library is vulnerable to a stack-based buffer overflow, caused by not handling non-normal x86 long double numbers gracefully for printf family functions. By sending a specially crafted value to the functions, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <2.23 | |
Redhat Enterprise Linux | =7.0 | |
Netapp Cloud Backup | ||
Netapp Solidfire Baseboard Management Controller | ||
IBM Cloud Pak for Security (CP4S) | <=1.6.0.1 | |
IBM Cloud Pak for Security (CP4S) | <=1.6.0.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.5.0.1 | |
IBM Cloud Pak for Security (CP4S) | <=1.5.0.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29573 is a vulnerability in the GNU C Library (glibc) that allows for a stack-based buffer overflow.
CVE-2020-29573 occurs due to the GNU C Library's failure to handle non-normal x86 long double inputs properly, leading to the buffer overflow vulnerability.
CVE-2020-29573 has a severity level of 7.5, which is considered high.
CVE-2020-29573 affects GNU C Library (glibc) versions up to and excluding 2.23, Red Hat Enterprise Linux 7.0, NetApp Cloud Backup, and NetApp SolidFire Baseboard Management Controller. It also affects IBM Cloud Pak for Security (CP4S) versions up to and including 1.7.2.0, 1.7.1.0, and 1.7.0.0.
To fix CVE-2020-29573, you should update affected software to a version that includes the necessary security patches. Refer to the vendor's advisories and security resources for specific guidance.