First published: Mon Sep 07 2015(Updated: )
A weakness in the dynamic loader has been found, making glibc of versions prior 2.22.90 affected. LD_POINTER_GUARD in the environment is not sanitizaed allowing attacker to easily bypass the pointer guarding protection on set-user-ID and set-group-ID programs. Reproducing steps available at: <a href="http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html">http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html</a> CVE request: <a href="http://seclists.org/oss-sec/2015/q3/504">http://seclists.org/oss-sec/2015/q3/504</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | <2.22.90 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1260581 is considered high due to its potential exploitation by attackers.
To fix REDHAT-BUG-1260581, upgrade your glibc to version 2.22.90 or later.
REDHAT-BUG-1260581 affects glibc versions prior to 2.22.90.
REDHAT-BUG-1260581 was discovered internally and documented by security researchers.
REDHAT-BUG-1260581 is a weakness in the dynamic loader that can lead to bypassing pointer protection mechanisms.