An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/fingolfin/memmove-bug - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20190329-0001/ - | |
References | () https://security.netapp.com/advisory/ntap-20190401-0001/ - | |
References | () https://sourceware.org/bugzilla/show_bug.cgi?id=22644 - Issue Tracking | |
References | () https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada - | |
References | () https://usn.ubuntu.com/4416-1/ - |
07 Nov 2023, 02:41
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-05-18 16:29
Updated : 2024-11-21 03:19
NVD link : CVE-2017-18269
Mitre link : CVE-2017-18269
CVE.ORG link : CVE-2017-18269
JSON object : View
Products Affected
linux
- linux_kernel
gnu
- glibc
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer