First published: Thu Jul 17 1997(Updated: )
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Delix Dld | =5.2 | |
Lst Lst Power Linux | =2.2 | |
Debian Debian Linux | =4.0 | |
Suse Suse Linux | =5.0 | |
Redhat Linux | =4.1 | |
Caldera Openlinux Lite | =1.1 | |
Redhat Linux | =4.0 | |
Redhat Linux | =4.2 | |
=5.2 | ||
=1.1 | ||
=4.0 | ||
=2.2 | ||
=4.0 | ||
=4.1 | ||
=4.2 | ||
=5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.