CVE-2011-2702

Publication date 20 July 2011

Last updated 24 July 2024


Ubuntu priority

Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.

Read the notes from the security team

Status

Package Ubuntu Release Status
eglibc 11.10 oneiric
Not affected
11.04 natty
Not affected
10.10 maverick
Not affected
10.04 LTS lucid
Fixed 2.11.1-0ubuntu7.10
8.04 LTS hardy Not in release
glibc 11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid Not in release
8.04 LTS hardy
Not affected

Notes


jdstrand

Ubuntu 10.10 have the corrected code

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
eglibc
glibc

References

Related Ubuntu Security Notices (USN)

    • USN-1396-1
    • GNU C Library vulnerabilities
    • 9 March 2012

Other references