Summary: | <sys-libs/musl-1.1.24: Buffer overflow in math (i386) libraries (CVE-2019-14697) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | blueness, lu_zero, toolchain |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.openwall.com/lists/oss-security/2019/08/06/4 | ||
Whiteboard: | B2 [glsa+ cve] | ||
Package list: | Runtime testing required: | --- |
Description
Sam James
2020-03-02 02:07:06 UTC
(In reply to sam_c (Security Padawan) from comment #0) > Description: > "musl libc through 1.1.23 has an x87 floating-point stack adjustment > imbalance, related to the math/i386/ directory. In some cases, use of this > library could introduce out-of-bounds writes that are not present in an > application's source code." > > See URL for more information. > > Affected versions: > - <1.1.23 > Correction: Affected versions: - <1.1.24 The bug has been closed via the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7b1c50f1d331f650a72558744dbae4bbbda38ce9 commit 7b1c50f1d331f650a72558744dbae4bbbda38ce9 Author: Anthony G. Basile <blueness@gentoo.org> AuthorDate: 2020-03-03 01:44:05 +0000 Commit: Anthony G. Basile <blueness@gentoo.org> CommitDate: 2020-03-03 01:44:54 +0000 sys-libs/musl: remove vulnerable world, bug #711276 Closes: https://bugs.gentoo.org/711276 Package-Manager: Portage-2.3.84, Repoman-2.3.20 Signed-off-by: Anthony G. Basile <blueness@gentoo.org> sys-libs/musl/Manifest | 1 - sys-libs/musl/musl-1.1.23.ebuild | 122 --------------------------------------- 2 files changed, 123 deletions(-) New GLSA request filed. This issue was resolved and addressed in GLSA 202003-13 at https://security.gentoo.org/glsa/202003-13 by GLSA coordinator Thomas Deutschmann (whissi). |