Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 386343 - <sys-libs/glibc-2.12.2: Execution of arbitrary code (CVE-2011-1071)
Summary: <sys-libs/glibc-2.12.2: Execution of arbitrary code (CVE-2011-1071)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL:
Whiteboard: A2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-10-08 14:54 UTC by GLSAMaker/CVETool Bot
Modified: 2013-12-03 04:14 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2011-10-08 14:54:31 UTC
CVE-2011-1071 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1071):
  The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC
  (EGLIBC) allow context-dependent attackers to execute arbitrary code or
  cause a denial of service (memory consumption) via a long UTF8 string that
  is used in an fnmatch call, aka a "stack extension attack," a related issue
  to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported
  for use of this library by Google Chrome.
Comment 1 Tobias Heinlein (RETIRED) gentoo-dev 2011-10-08 14:55:06 UTC
Already stable, nothing to do here, just for security tracking purposes.
Comment 2 SpanKY gentoo-dev 2012-04-13 23:54:37 UTC
glibc-2.13 is stable now
Comment 3 Mark Loeser (RETIRED) gentoo-dev 2013-02-22 23:26:12 UTC
toolchain done
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2013-12-03 04:14:36 UTC
This issue was resolved and addressed in
 GLSA 201312-01 at http://security.gentoo.org/glsa/glsa-201312-01.xml
by GLSA coordinator Chris Reffett (creffett).