1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
|
PublicDateAtUSN: 2011-07-20
Candidate: CVE-2011-2702
PublicDate: 2014-10-27
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2702
http://www.nodefense.org/eglibc.txt
http://www.ubuntu.com/usn/usn-1396-1
Description:
Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when
using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows
context-dependent attackers to execute arbitrary code via a negative length
parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3)
memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an
out-of-bounds read, as demonstrated using the memcpy function.
Ubuntu-Description:
Notes:
jdstrand> Ubuntu 10.10 have the corrected code
Bugs:
Priority: medium
Discovered-by:
Assigned-to:
Patches_glibc:
patch: http://sourceware.org/git/?p=glibc.git;a=commit;h=a0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e
upstream_glibc: needs-triage
hardy_glibc: not-affected (code-not-present)
lucid_glibc: DNE
maverick_glibc: DNE
natty_glibc: DNE
oneiric_glibc: DNE
devel_glibc: DNE
Patches_eglibc:
upstream: http://www.eglibc.org/cgi-bin/viewvc.cgi?view=rev&revision=10032
upstream_eglibc: needs-triage
hardy_eglibc: DNE
lucid_eglibc: released (2.11.1-0ubuntu7.10)
maverick_eglibc: not-affected
natty_eglibc: not-affected
oneiric_eglibc: not-affected
devel_eglibc: not-affected
|