Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 711276 (CVE-2019-14697) - <sys-libs/musl-1.1.24: Buffer overflow in math (i386) libraries (CVE-2019-14697)
Summary: <sys-libs/musl-1.1.24: Buffer overflow in math (i386) libraries (CVE-2019-14697)
Status: RESOLVED FIXED
Alias: CVE-2019-14697
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://www.openwall.com/lists/oss-se...
Whiteboard: B2 [glsa+ cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-03-02 02:07 UTC by Sam James
Modified: 2020-03-14 16:38 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-02 02:07:06 UTC
Description:
"musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code."

See URL for more information.

Affected versions:
- <1.1.23

Patches:
1) https://git.musl-libc.org/cgit/musl/patch/?id=f3ed8bfe8a82af1870ddc8696ed4cc1d5aa6b441
2) https://git.musl-libc.org/cgit/musl/patch/?id=6818c31c9bc4bbad5357f1de14bedf781e5b349e
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-02 02:08:47 UTC
(In reply to sam_c (Security Padawan) from comment #0)
> Description:
> "musl libc through 1.1.23 has an x87 floating-point stack adjustment
> imbalance, related to the math/i386/ directory. In some cases, use of this
> library could introduce out-of-bounds writes that are not present in an
> application's source code."
> 
> See URL for more information.
> 
> Affected versions:
> - <1.1.23
> 

Correction:

Affected versions:
- <1.1.24
Comment 2 Larry the Git Cow gentoo-dev 2020-03-03 01:45:02 UTC
The bug has been closed via the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7b1c50f1d331f650a72558744dbae4bbbda38ce9

commit 7b1c50f1d331f650a72558744dbae4bbbda38ce9
Author:     Anthony G. Basile <blueness@gentoo.org>
AuthorDate: 2020-03-03 01:44:05 +0000
Commit:     Anthony G. Basile <blueness@gentoo.org>
CommitDate: 2020-03-03 01:44:54 +0000

    sys-libs/musl: remove vulnerable world, bug #711276
    
    Closes: https://bugs.gentoo.org/711276
    Package-Manager: Portage-2.3.84, Repoman-2.3.20
    Signed-off-by: Anthony G. Basile <blueness@gentoo.org>

 sys-libs/musl/Manifest           |   1 -
 sys-libs/musl/musl-1.1.23.ebuild | 122 ---------------------------------------
 2 files changed, 123 deletions(-)
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2020-03-03 20:41:13 UTC
New GLSA request filed.
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2020-03-14 16:38:30 UTC
This issue was resolved and addressed in
 GLSA 202003-13 at https://security.gentoo.org/glsa/202003-13
by GLSA coordinator Thomas Deutschmann (whissi).