CVE-2011-2702
Published: 20 July 2011
Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.
Notes
Author | Note |
---|---|
jdstrand |
Ubuntu 10.10 have the corrected code |
Priority
Status
Package | Release | Status |
---|---|---|
eglibc
Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Released
(2.11.1-0ubuntu7.10)
|
|
maverick |
Not vulnerable
|
|
natty |
Not vulnerable
|
|
oneiric |
Not vulnerable
|
|
upstream |
Needs triage
|
|
Patches:
upstream: http://www.eglibc.org/cgi-bin/viewvc.cgi?view=rev&revision=10032 |
||
glibc
Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
(code-not-present)
|
lucid |
Does not exist
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Does not exist
|
|
upstream |
Needs triage
|
|
Patches:
other: http://sourceware.org/git/?p=glibc.git;a=commit;h=a0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e |