Back to bug 25620

Who When What Removed Added
sourceware 2020-03-16 18:59:10 UTC CC sourceware
carlos 2020-03-16 20:19:36 UTC Ever confirmed 0 1
Summary ### Summary An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a Signed comparison vulnerability in the ARMv7 memcpy()
Status UNCONFIRMED NEW
CC carlos
Last reconfirmed 2020-03-16
Flags security+
adhemerval.zanella 2020-03-16 20:32:31 UTC CC adhemerval.zanella
carlos 2020-03-28 02:36:50 UTC Alias CVE-2020-6096
Summary Signed comparison vulnerability in the ARMv7 memcpy() Signed comparison vulnerability in the ARMv7 memcpy() (CVE-2020-6096)
carnil 2020-04-02 15:24:56 UTC CC carnil
rearnsha 2020-04-06 10:27:49 UTC CC rearnsha
wdijkstr 2020-04-07 17:47:40 UTC CC wdijkstr
fweimer 2020-04-07 18:07:14 UTC CC fweimer
carlos 2020-04-07 20:49:03 UTC See Also https://bugzilla.redhat.com/show_bug.cgi?id=1820331
nsz 2020-04-08 13:34:12 UTC CC nsz
fweimer 2020-07-08 12:22:20 UTC Resolution --- FIXED
Status NEW RESOLVED
Version 2.3.1 2.32
jsm28 2020-07-08 16:46:54 UTC Target Milestone --- 2.32
oliveandnini 2021-03-19 01:31:10 UTC CC oliveandnini
fweimer 2021-03-19 06:22:43 UTC Comment 31 Tag spam
alucca388 2021-06-02 04:54:32 UTC CC alucca388
fweimer 2021-06-02 05:13:13 UTC Comment 32 Tag spam
aricjoshua44 2021-10-04 15:12:40 UTC CC aricjoshua44
schwab 2021-10-04 15:30:17 UTC Comment 33 Tag spam
boardgamesaz 2021-11-03 09:11:20 UTC CC boardgamesaz
fweimer 2021-11-03 09:15:31 UTC Comment 34 Tag spam
fweimer 2021-11-03 09:15:35 UTC Comment 35 Tag spam
ellasofia253 2021-11-21 15:46:08 UTC CC ellasofia253
schwab 2021-11-21 16:09:48 UTC Comment 36 Tag spam
fweimer 2022-11-02 07:25:24 UTC Comment 37 Tag spam

Back to bug 25620