CVE Vulnerabilities

CVE-2015-8777

Published: Jan 20, 2016 | Modified: Apr 12, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
3.7 LOW
AV:L/AC:H/Au:N/C:P/I:P/A:P
RedHat/V3
7 LOW
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

Affected Software

NameVendorStart VersionEnd Version
GlibcGnu*2.22 (including)
Red Hat Enterprise Linux 7RedHatglibc-0:2.17-196.el7*
EglibcUbuntuesm-infra-legacy/trusty*
EglibcUbuntuprecise*
EglibcUbuntutrusty*
EglibcUbuntutrusty/esm*
EglibcUbuntuupstream*
GlibcUbuntuupstream*
GlibcUbuntuvivid*
GlibcUbuntuvivid/stable-phone-overlay*
GlibcUbuntuvivid/ubuntu-core*
GlibcUbuntuwily*

References