CVE-2011-2702

NameCVE-2011-2702
DescriptionInteger signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glibc (PTS)buster2.28-10+deb10u1fixed
buster (security)2.28-10+deb10u2fixed
bullseye2.31-13+deb11u8fixed
bullseye (security)2.31-13+deb11u9fixed
bookworm2.36-9+deb12u4fixed
bookworm (security)2.36-9+deb12u6fixed
sid, trixie2.37-18fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
eglibcsourcesqueeze(not affected)
eglibcsource(unstable)2.13-10
glibcsource(unstable)(not affected)

Notes

[squeeze] - eglibc <not-affected> (ssse3 optimizations not included in squeeze version)
- glibc <not-affected> (ssse3 optimizations not included)
http://web.archive.org/web/20110824011938/http://www.nodefense.org:80/eglibc.txt
fixed well before 2.13-10, but that is the present testing version that was available to check

Search for package or bug name: Reporting problems