CVE-2019-7309 The advisory has been revoked - it doesn't affect any version of package glibc Open this link in a new tab


    Threat Intelligence

    EPSS 0.09% (36th percentile)
Expand this section
NVD
5.5 medium
Expand this section
Red Hat
3.3 low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UBUNTU1904-GLIBC-526520
  • published 3 Feb 2019
  • disclosed 3 Feb 2019

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:19.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu.

In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.