Vulnerability & Exploit Database

Displaying all 10 entries

Results for: CVE-2015-8777 Back to search

Ubuntu: (Multiple Advisories) (CVE-2015-8777): GNU C Library regression Vulnerability

  • Severity: 2
  • Published: January 20, 2016

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

SUSE: CVE-2015-8777: SUSE Linux Security Advisory Vulnerability

  • Severity: 2
  • Published: January 20, 2016

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

Huawei EulerOS: CVE-2015-8777: glibc security update Vulnerability

  • Severity: 2
  • Published: January 20, 2016

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

Huawei EulerOS: CVE-2015-8777: glibc security update Vulnerability

  • Severity: 2
  • Published: January 20, 2016

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

Gentoo Linux: CVE-2015-8777: GNU C Library: Multiple vulnerabilities Vulnerability

  • Severity: 2
  • Published: January 20, 2016

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

Debian: CVE-2015-8777: eglibc -- security update Vulnerability

  • Severity: 2
  • Published: January 20, 2016

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.