~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
PublicDateAtUSN: 2011-07-20
Candidate: CVE-2011-2702
PublicDate: 2014-10-27
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2702
 http://www.nodefense.org/eglibc.txt
 http://www.ubuntu.com/usn/usn-1396-1
Description:
 Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when
 using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows
 context-dependent attackers to execute arbitrary code via a negative length
 parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3)
 memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an
 out-of-bounds read, as demonstrated using the memcpy function.
Ubuntu-Description:
Notes:
 jdstrand> Ubuntu 10.10 have the corrected code
Bugs:
Priority: medium
Discovered-by:
Assigned-to:

Patches_glibc:
 patch: http://sourceware.org/git/?p=glibc.git;a=commit;h=a0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e
upstream_glibc: needs-triage
hardy_glibc: not-affected (code-not-present)
lucid_glibc: DNE
maverick_glibc: DNE
natty_glibc: DNE
oneiric_glibc: DNE
devel_glibc: DNE

Patches_eglibc:
 upstream: http://www.eglibc.org/cgi-bin/viewvc.cgi?view=rev&revision=10032
upstream_eglibc: needs-triage
hardy_eglibc: DNE
lucid_eglibc: released (2.11.1-0ubuntu7.10)
maverick_eglibc: not-affected
natty_eglibc: not-affected
oneiric_eglibc: not-affected
devel_eglibc: not-affected