|
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or
libc6) before 2.23 allows local users to bypass a pointer-guarding protection
mechanism via a zero value of the LD_POINTER_GUARD environment variable.
(From OE-Core rev: 22570ba08d7c6157aec58764c73b1134405b0252)
References:
https://sourceware.org/bugzilla/show_bug.cgi?id=18928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
Reproducing steps available at:
http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html
CVE request: http://seclists.org/oss-sec/2015/q3/504
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
|