First published: Fri May 18 2018(Updated: )
An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | >=2.21<=2.27 | |
Linux Kernel | ||
All of | ||
GNU C Library (glibc) | >=2.21<=2.27 | |
Linux Kernel | ||
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18269 is a vulnerability in the GNU C Library (glibc) that affects versions 2.21 through 2.27.
CVE-2017-18269 has a severity score of 9.8, indicating it is a critical vulnerability.
The affected software of CVE-2017-18269 is glibc versions 2.21 through 2.27.
To fix CVE-2017-18269, you should update glibc to version 2.28 or higher.
More information about CVE-2017-18269 can be found at the following references: [link1], [link2], [link3].