Back to bug 25620

Who When What Removed Added
sourceware 2020-03-16 18:59:10 UTC CC sourceware
carlos 2020-03-16 20:19:36 UTC Ever confirmed 0 1
Summary ### Summary An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a Signed comparison vulnerability in the ARMv7 memcpy()
Status UNCONFIRMED NEW
CC carlos
Last reconfirmed 2020-03-16
Flags security+
adhemerval.zanella 2020-03-16 20:32:31 UTC CC adhemerval.zanella
carlos 2020-03-28 02:36:50 UTC Alias CVE-2020-6096
Summary Signed comparison vulnerability in the ARMv7 memcpy() Signed comparison vulnerability in the ARMv7 memcpy() (CVE-2020-6096)
carnil 2020-04-02 15:24:56 UTC CC carnil
rearnsha 2020-04-06 10:27:49 UTC CC rearnsha
wdijkstr 2020-04-07 17:47:40 UTC CC wdijkstr
fweimer 2020-04-07 18:07:14 UTC CC fweimer
carlos 2020-04-07 20:49:03 UTC See Also https://bugzilla.redhat.com/show_bug.cgi?id=1820331
nsz 2020-04-08 13:34:12 UTC CC nsz
fweimer 2020-07-08 12:22:20 UTC Resolution --- FIXED
Status NEW RESOLVED
Version 2.3.1 2.32
jsm28 2020-07-08 16:46:54 UTC Target Milestone --- 2.32
oliveandnini 2021-03-19 01:31:10 UTC CC oliveandnini
fweimer 2021-03-19 06:22:43 UTC Comment 31 Tag spam

Back to bug 25620