Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-7309

Опубликовано: 02 фев. 2019
Источник: redhat
CVSS3: 3.3

Описание

In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.

Отчет

This issue only affects x32 arch, which is not supported in Red Hat Enterprise Linux kernels (CONFIG_X86_X32 is not set). Therefore glibc packages shipped with Red Hat Enterprise Linux are not affected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7glibcNot affected
Red Hat Enterprise Linux 8glibcNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-393
https://bugzilla.redhat.com/show_bug.cgi?id=1672232glibc: memcmp function incorrectly returns zero

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 7 лет назад

In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.

CVSS3: 5.5
nvd
около 7 лет назад

In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.

CVSS3: 5.5
msrc
больше 5 лет назад

Описание отсутствует

CVSS3: 5.5
debian
около 7 лет назад

In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp fun ...

CVSS3: 5.5
github
больше 3 лет назад

In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.

3.3 Low

CVSS3