CVE-2020-1751

An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751 Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/202006-04 Third Party Advisory
https://security.netapp.com/advisory/ntap-20200430-0002/ Third Party Advisory
https://sourceware.org/bugzilla/show_bug.cgi?id=25423 Issue Tracking Third Party Advisory
https://usn.ubuntu.com/4416-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*

History

27 Jan 2023, 18:34

Type Values Removed Values Added
First Time Canonical
Canonical ubuntu Linux
CPE cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
References (UBUNTU) https://usn.ubuntu.com/4416-1/ - (UBUNTU) https://usn.ubuntu.com/4416-1/ - Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202006-04 - (GENTOO) https://security.gentoo.org/glsa/202006-04 - Third Party Advisory

Information

Published : 2020-04-17 19:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-1751

Mitre link : CVE-2020-1751

CVE.ORG link : CVE-2020-1751


JSON object : View

Products Affected

canonical

  • ubuntu_linux

redhat

  • enterprise_linux

gnu

  • glibc
CWE
CWE-787

Out-of-bounds Write