CVE-2010-0830
Published: 7 April 2010
Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.
Priority
Status
Package | Release | Status |
---|---|---|
eglibc Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Does not exist
|
|
intrepid |
Does not exist
|
|
jaunty |
Does not exist
|
|
karmic |
Released
(2.10.1-0ubuntu17)
|
|
lucid |
Released
(2.11.1-0ubuntu7.1)
|
|
upstream |
Needed
|
|
glibc Launchpad, Ubuntu, Debian |
dapper |
Released
(2.3.6-0ubuntu20.6)
|
hardy |
Released
(2.7-10ubuntu6)
|
|
intrepid |
Ignored
(end of life, was needed)
|
|
jaunty |
Released
(2.9-4ubuntu6.2)
|
|
karmic |
Does not exist
|
|
lucid |
Does not exist
|
|
upstream |
Needed
|