Описание
The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.
A flaw was found in the strncmp glibc function optimized for the Power10 architecture. Overwriting two vector registers could disrupt program control flow, possibly leading to system instability.
Отчет
No Red Hat products or offerings are affected by this vulnerability. This vulnerability is Important rather than Moderate — due to its potential to break fundamental ABI (Application Binary Interface) guarantees, which can have far-reaching implications for system stability and security. The PowerPC64LE ABI explicitly requires that non-volatile vector registers (v20–v31) be preserved across function calls. By violating this contract, the optimized strncmp implementation in glibc 2.40+ introduces a low-level corruption risk that can cause subtle and hard-to-diagnose failures in user applications or system libraries relying on these registers. Such corruption can lead to control flow anomalies, crashes, or memory disclosure without any fault in the calling code — a particularly dangerous property.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | glibc | Not affected | ||
Red Hat Enterprise Linux 6 | compat-glibc | Not affected | ||
Red Hat Enterprise Linux 6 | glibc | Not affected | ||
Red Hat Enterprise Linux 7 | compat-glibc | Not affected | ||
Red Hat Enterprise Linux 7 | glibc | Not affected | ||
Red Hat Enterprise Linux 8 | glibc | Not affected | ||
Red Hat Enterprise Linux 9 | glibc | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
8.1 High
CVSS3
Связанные уязвимости
The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.
The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.
The strncmp implementation optimized for the Power10 processor in the ...
The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.
EPSS
8.1 High
CVSS3