Description
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3480-1 | eglibc security update |
EUVD |
EUVD-2015-8649 | The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable. |
Ubuntu USN |
USN-2985-1 | GNU C Library vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T08:29:21.801Z
Reserved: 2016-01-19T00:00:00.000Z
Link: CVE-2015-8777
No data.
Status : Modified
Published: 2016-01-20T05:59:01.237
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-8777
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN