{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T16:46:40.973","vulnerabilities":[{"cve":{"id":"CVE-2025-5702","sourceIdentifier":"3ff69d7a-14f2-4f67-a097-88dee7810d18","published":"2025-06-05T19:15:31.073","lastModified":"2025-10-01T15:37:50.070","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program."},{"lang":"es","value":"La implementación de strcmp optimizada para el procesador Power10 en GNU C Library versión 2.39 y posteriores escribe en los registros vectoriales v20 a v31 sin guardar el contenido del llamador (esos registros están definidos como registros no volátiles por la ABI powerpc64le), lo que da como resultado la sobrescritura de su contenido y la posible alteración del flujo de control del llamador o la filtración de las cadenas de entrada a la función a otras partes del programa."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":5.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":3.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-665"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","versionStartIncluding":"2.39","versionEndExcluding":"2.39-209","matchCriteriaId":"11DB6645-FBFE-4D4F-A4B5-800A1E5121EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","versionStartIncluding":"2.40","versionEndExcluding":"2.40-139","matchCriteriaId":"C1D163B8-3B41-4E62-A663-754619807309"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","versionStartIncluding":"2.41","versionEndExcluding":"2.41-60","matchCriteriaId":"0DFAD8AF-BE93-4289-B4C4-7834FFFAEBD0"}]}]}],"references":[{"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33056","source":"3ff69d7a-14f2-4f67-a097-88dee7810d18","tags":["Issue Tracking"]}]}}]}