1
PublicDateAtUSN: 2011-07-20
2
Candidate: CVE-2011-2702
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2702
6
http://www.nodefense.org/eglibc.txt
7
https://usn.ubuntu.com/usn/usn-1396-1
9
Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when
10
using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows
11
context-dependent attackers to execute arbitrary code via a negative length
12
parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3)
13
memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an
14
out-of-bounds read, as demonstrated using the memcpy function.
17
jdstrand> Ubuntu 10.10 have the corrected code
24
patch: http://sourceware.org/git/?p=glibc.git;a=commit;h=a0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e
25
upstream_glibc: needs-triage
26
hardy_glibc: not-affected (code-not-present)
34
upstream: http://www.eglibc.org/cgi-bin/viewvc.cgi?view=rev&revision=10032
35
upstream_eglibc: needs-triage
37
lucid_eglibc: released (2.11.1-0ubuntu7.10)
38
maverick_eglibc: not-affected
39
natty_eglibc: not-affected
40
oneiric_eglibc: not-affected
41
devel_eglibc: not-affected