CVE-2020-29573 - log back

CVE-2020-29573 edited at 16 Dec 2020 16:19:56
References
https://sourceware.org/bugzilla/show_bug.cgi?id=26649
- https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=681900d29683722b1cb0a8e565a0585846ec5a61
+ https://bugzilla.redhat.com/show_bug.cgi?id=1905213#c5
+ https://sourceware.org/git/?p=glibc.git;h=d81f90ccd0109de9ed78aeeb8d86e2c6d4600690
+ https://sourceware.org/git/?p=glibc.git;h=8df4e219e43a4a257d0759b54fef8c488e2f282e
CVE-2020-29573 edited at 06 Dec 2020 09:19:43
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Local
Type
- Unknown
+ Arbitrary code execution
Description
+ sysdeps/i386/ldbl2mpn.c in glibc before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf.
References
+ https://sourceware.org/bugzilla/show_bug.cgi?id=26649
+ https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=681900d29683722b1cb0a8e565a0585846ec5a61
CVE-2020-29573 created at 06 Dec 2020 09:15:40
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes