Description
Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2058-1 | New glibc packages fix several vulnerabilities |
EUVD |
EUVD-2010-0855 | Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header. |
Ubuntu USN |
USN-944-1 | GNU C Library vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-08-07T00:59:39.371Z
Reserved: 2010-03-03T00:00:00.000Z
Link: CVE-2010-0830
No data.
Status : Modified
Published: 2010-06-01T20:30:02.820
Modified: 2026-04-29T01:13:23.040
Link: CVE-2010-0830
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN