Your submission was sent successfully! Close

CVE-2015-8777

Published: 20 January 2016

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

From the Ubuntu security team

Hector Marco and Ismael Ripoll discovered that the GNU C Library allowed the pointer-guarding protection mechanism to be disabled by honoring the LD_POINTER_GUARD environment variable across privilege boundaries. An local attacker could use this to exploit an existing vulnerability more easily.

Priority

Low

CVSS 3 base score: 5.5

Status

Package Release Status
eglibc
Launchpad, Ubuntu, Debian
precise
Released (2.15-0ubuntu10.14)
trusty
Released (2.19-0ubuntu6.8)
upstream Needed

vivid Does not exist

wily Does not exist

xenial Does not exist

yakkety Does not exist

zesty Does not exist

glibc
Launchpad, Ubuntu, Debian
precise Does not exist

trusty Does not exist

upstream
Released (2.21-6)
vivid Ignored
(reached end-of-life)
wily
Released (2.21-0ubuntu4.2)
xenial Not vulnerable
(2.23-0ubuntu1)
yakkety Not vulnerable
(2.23-0ubuntu1)
zesty Not vulnerable
(2.23-0ubuntu1)
Patches:
upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a014cecd82b71b70a6a843e250e06b541ad524f7