{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5745","assignerOrgId":"3ff69d7a-14f2-4f67-a097-88dee7810d18","state":"PUBLISHED","assignerShortName":"glibc","dateReserved":"2025-06-05T19:15:09.234Z","datePublished":"2025-06-05T19:20:23.405Z","dateUpdated":"2025-06-05T20:13:51.068Z"},"containers":{"cna":{"providerMetadata":{"orgId":"3ff69d7a-14f2-4f67-a097-88dee7810d18","shortName":"glibc","dateUpdated":"2025-06-05T19:20:57.253Z"},"datePublic":"2025-06-05T02:03:00.000Z","affected":[{"vendor":"The GNU C Library","product":"glibc","platforms":["Power10"],"versions":[{"status":"affected","version":"2.40","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.","supportingMedia":[{"type":"text/html","base64":false,"value":"The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program."}]}],"references":[{"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33060"}],"workarounds":[{"lang":"en","value":"One may disable the Power10 optimized string routines in glibc to work around this issue, by setting the glibc.cpu.hwcaps tunable. This can be done by exporting the GLIBC_TUNABLES environment variable like so:\n\n\n\n\nexport GLIBC_TUNABLES=glibc.cpu.hwcaps=-arch_3_1","supportingMedia":[{"type":"text/html","base64":false,"value":"One may disable the Power10 optimized string routines in glibc to work around this issue, by setting the <code>glibc.cpu.hwcaps</code> tunable. This can be done by exporting the <code>GLIBC_TUNABLES</code> environment variable like so:<br><br>\n\n<code>\nexport GLIBC_TUNABLES=glibc.cpu.hwcaps=-arch_3_1</code>"}]}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-665","lang":"en","description":"CWE-665 Improper Initialization"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.6,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"LOW","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-06-05T20:11:39.550335Z","id":"CVE-2025-5745","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-05T20:13:51.068Z"}}]}}