DescriptionAn SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glibc (PTS)jessie (security), jessie2.19-18+deb8u10fixed
stretch (security)2.24-11+deb9u1vulnerable
buster, sid2.27-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
eglibcsource(unstable)(not affected)
glibcsourcejessie(not affected)


[stretch] - glibc <no-dsa> (Minor issue, can be fixed along in future DSA or point update)
[jessie] - glibc <not-affected> (Vulnerable code not present)
- eglibc <not-affected> (Vulnerable code not present);h=cd66c0e584c6d692bc8347b5e72723d02b8a8ada

Search for package or bug name: Reporting problems