CVE-2019-7309
Publication date 3 February 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.
Status
Package | Ubuntu Release | Status |
---|---|---|
eglibc | 20.04 LTS focal | Not in release |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Ignored | |
glibc | 20.04 LTS focal |
Not affected
|
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release |
Notes
mdeslaur
only affects x32 we will not be fixing this issue in Ubuntu stable releases, marking as ignored
Patch details
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 · Medium |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |