Name | CVE-2011-2702 |
Description | Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
glibc (PTS) | bullseye | 2.31-13+deb11u11 | fixed |
bullseye (security) | 2.31-13+deb11u10 | fixed | |
bookworm | 2.36-9+deb12u8 | fixed | |
bookworm (security) | 2.36-9+deb12u7 | fixed | |
trixie | 2.40-2 | fixed | |
sid | 2.40-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
eglibc | source | squeeze | (not affected) | |||
eglibc | source | (unstable) | 2.13-10 | |||
glibc | source | (unstable) | (not affected) |
[squeeze] - eglibc <not-affected> (ssse3 optimizations not included in squeeze version)
- glibc <not-affected> (ssse3 optimizations not included)
http://web.archive.org/web/20110824011938/http://www.nodefense.org:80/eglibc.txt
fixed well before 2.13-10, but that is the present testing version that was available to check