This is the mail archive of the
libc-alpha@sourceware.org
mailing list for the glibc project.
Re: [PATCH 0/8] x86-64: Properly handle the length parameter [BZ# 24097]
On 01/18/2019 12:47 PM, H.J. Lu wrote:
> Now it has:
>
> CVE-2019-6488: On x32, the size_t parameter may be passed in the lower
> 32 bits of a 64-bit register with with non-zero upper 32 bit. When it
> happened, the string/memory functions written in assembly would cause a
> buffer overflow because the full 64-bit register was used as the 32-bit
> size_t value. Reported by H.J. Lu.
How about:
CVE-2019-6488: On x32, the size_t parameter may be passed in the lower
32 bits of a 64-bit register with non-zero upper 32 bits, causing a
buffer overflow in string and memory functions written in assembly when
the full 64-bit register was used as the 32-bit size_t value.
Rical