CVE-2025-5745
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-05

Last updated on: 2025-10-22

Assigner: GNU C Library

Description
The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-05
Last Modified
2025-10-22
Generated
2026-05-07
AI Q&A
2025-06-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
gnu glibc From 2.40 (inc) to 2.40-136 (exc)
gnu glibc From 2.41 (inc) to 2.41-57 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-665 The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the strncmp function optimized for the Power10 processor in GNU C Library version 2.40 and later. The function writes to certain vector registers (v20 to v31) without saving their previous contents, even though these registers are supposed to be preserved according to the powerpc64le ABI. This can overwrite important data from the caller, potentially changing the program's control flow or causing sensitive input strings to be leaked to other parts of the program.


How can this vulnerability impact me? :

The vulnerability can lead to altered control flow in programs using the affected strncmp implementation, which may cause unexpected behavior or crashes. Additionally, it can result in leaking sensitive input strings to other parts of the program, potentially exposing confidential information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart