Integer overflow in the process_envvars function in elf/rtld.c in glibc before 2.5-rc4 might allow local users to execute arbitrary code via a large LD_HWCAP_MASK environment variable value. NOTE: the glibc maintainers state that they do not believe that this issue is exploitable for code execution
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/24758 | vdb entry |
http://bugs.gentoo.org/show_bug.cgi?id=183844 | |
http://www.sourceware.org/ml/libc-hacker/2007-07/msg00001.html | mailing list |
http://www.vupen.com/english/advisories/2007/2418 | vdb entry vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35240 | vdb entry |
http://osvdb.org/37901 | vdb entry |
http://www.securitytracker.com/id?1018334 | vdb entry |
http://secunia.com/advisories/25864 | third party advisory vendor advisory |
http://security.gentoo.org/glsa/glsa-200707-04.xml | vendor advisory |
http://sources.gentoo.org/viewcvs.py/gentoo/src/patchsets/glibc/2.5/1600_all_glibc-hwcap-mask-secure.patch?rev=1.1&view=markup |