Description: "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c." Patch: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f Fixed in 2.32.
Unable to check for sanity: > dependent bug #712726 is missing keywords
Resetting sanity check; package list is empty or all packages are done.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=cce133930b2d85cd8bed66715857ccf550048bbd commit cce133930b2d85cd8bed66715857ccf550048bbd Author: Andreas K. Hüttel <dilfridge@gentoo.org> AuthorDate: 2020-05-04 18:35:42 +0000 Commit: Andreas K. Hüttel <dilfridge@gentoo.org> CommitDate: 2020-05-04 18:37:12 +0000 package.mask: Update old glibc mask, now masking <2.30-r8 Bug: https://bugs.gentoo.org/712726 Bug: https://bugs.gentoo.org/677272 Bug: https://bugs.gentoo.org/679044 Bug: https://bugs.gentoo.org/711558 Bug: https://bugs.gentoo.org/717938 Signed-off-by: Andreas K. Hüttel <dilfridge@gentoo.org> profiles/package.mask | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
Arches and Maintainer(s), Thank you for your work. Added to an existing GLSA Request.
This issue was resolved and addressed in GLSA 202006-04 at https://security.gentoo.org/glsa/202006-04 by GLSA coordinator Aaron Bauman (b-man).