Published: 01 April 2020

An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.



CVSS 3 base score: 8.1


Package Release Status
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Needed

Launchpad, Ubuntu, Debian
Upstream Pending
Ubuntu 21.04 (Hirsute Hippo)
Released (2.32-0ubuntu3)
Ubuntu 20.04 LTS (Focal Fossa) Needed

Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.23-0ubuntu11.3)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Upstream:;h=eec0f4218cda936a6ab8f543e90b96b196df3fc2 (test)
Upstream:;h=eca1b233322914d9013f3ee4aabecaadc9245abd (test)
Upstream:;h=7b5f02dc2a9278cd068a58a3db3644e24707be49 (test)