Bug 1667931 (CVE-2019-6488) - CVE-2019-6488 glibc: Incorrect attempt to use a 64-bit register for size_t in assembly codes results in segmentation fault
Summary: CVE-2019-6488 glibc: Incorrect attempt to use a 64-bit register for size_t in...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-6488
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1667932
Blocks: Embargoed1667933
TreeView+ depends on / blocked
 
Reported: 2019-01-21 13:16 UTC by Dhananjay Arunesh
Modified: 2021-02-16 22:30 UTC (History)
26 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-01-21 15:40:16 UTC


Attachments (Terms of Use)

Description Dhananjay Arunesh 2019-01-21 13:16:05 UTC
The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy.

UPstream Issue:

https://sourceware.org/bugzilla/show_bug.cgi?id=24097

Comment 1 Dhananjay Arunesh 2019-01-21 13:16:20 UTC
Created glibc tracking bugs for this issue:

Affects: fedora-all [bug 1667932]

Comment 3 Stefan Cornelius 2019-01-21 15:40:19 UTC
Statement:

This issue did not affect the versions of glibc as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they did not include support for x32.


Note You need to log in before you can comment on or make changes to this bug.