Name | CVE-2019-7309 |
Description | In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
glibc (PTS) | jessie, jessie (lts) | 2.19-18+deb8u14 | vulnerable |
| stretch (security) | 2.24-11+deb9u1 | vulnerable |
| stretch (lts), stretch | 2.24-11+deb9u7 | vulnerable |
| buster (security), buster, buster (lts) | 2.28-10+deb10u4 | fixed |
| bullseye | 2.31-13+deb11u11 | fixed |
| bullseye (security) | 2.31-13+deb11u10 | fixed |
| bookworm | 2.36-9+deb12u9 | fixed |
| bookworm (security) | 2.36-9+deb12u7 | fixed |
| sid, trixie | 2.40-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
glibc | source | (unstable) | 2.28-6 | unimportant | | |
Notes
https://sourceware.org/bugzilla/show_bug.cgi?id=24155
https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
x32 not officially supported