CVE-2010-0830
01.06.2010, 20:30
Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | glibc | 2.0.1 |
gnu | glibc | 2.0.2 |
gnu | glibc | 2.0.3 |
gnu | glibc | 2.0.4 |
gnu | glibc | 2.0.5 |
gnu | glibc | 2.0.6 |
gnu | glibc | 2.1 |
gnu | glibc | 2.1.1 |
gnu | glibc | 2.1.1.6 |
gnu | glibc | 2.1.2 |
gnu | glibc | 2.1.3 |
gnu | glibc | 2.1.9 |
gnu | glibc | 2.2 |
gnu | glibc | 2.2.1 |
gnu | glibc | 2.2.2 |
gnu | glibc | 2.2.3 |
gnu | glibc | 2.2.4 |
gnu | glibc | 2.2.5 |
gnu | glibc | 2.3 |
gnu | glibc | 2.3.1 |
gnu | glibc | 2.3.2 |
gnu | glibc | 2.3.3 |
gnu | glibc | 2.3.4 |
gnu | glibc | 2.3.5 |
gnu | glibc | 2.3.6 |
gnu | glibc | 2.3.10 |
gnu | glibc | 2.4 |
gnu | glibc | 2.5 |
gnu | glibc | 2.5.1 |
gnu | glibc | 2.6 |
gnu | glibc | 2.6.1 |
gnu | glibc | 2.7 |
gnu | glibc | 2.8 |
gnu | glibc | 2.9 |
gnu | glibc | 2.10 |
gnu | glibc | 2.10.1 |
gnu | glibc | 2.11 |
gnu | glibc | 2.11.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References