Severity
5.5MEDIUMNVD
EPSS
0.0%
top 87.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 4
Latest updateMay 24

Description

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDgnu/glibc< 2.32.0
Debiangnu/glibc< 2.30-1+3
NVDopensuse/leap15.1

Also affects: Ubuntu Linux 16.04, 18.04, 19.10, Debian Linux 10.0, Fedora 30, 31, 32

🔴Vulnerability Details

3
GHSA
GHSA-68cv-639q-x75m: The GNU C Library (aka glibc or libc6) before 22022-05-24
CVEList
CVE-2020-10029: The GNU C Library (aka glibc or libc6) before 22020-03-04
OSV
CVE-2020-10029: The GNU C Library (aka glibc or libc6) before 22020-03-04

📋Vendor Advisories

4
Ubuntu
GNU C Library vulnerabilities2020-07-06
Microsoft
The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern a seen wh2020-03-10
Red Hat
glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions2020-02-12
Debian
CVE-2020-10029: glibc - The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack bu...2020

💬Community

2
Bugzilla
CVE-2020-10029 glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions [fedora-all]2020-03-05
Bugzilla
CVE-2020-10029 glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions2020-03-05
CVE-2020-10029 — Out-of-bounds Write in GNU Glibc | cvebase