Total vulnerabilities in the database
Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.
Software | From | Fixed in |
---|---|---|
gnu / glibc | 2.2.2 | 2.2.2.x |
gnu / glibc | 2.9 | 2.9.x |
gnu / glibc | 2.7 | 2.7.x |
gnu / glibc | 2.1.2 | 2.1.2.x |
gnu / glibc | 2.11 | 2.11.x |
gnu / glibc | 2.0.5 | 2.0.5.x |
gnu / glibc | 2.2.5 | 2.2.5.x |
gnu / glibc | 2.0.6 | 2.0.6.x |
gnu / glibc | 2.10.1 | 2.10.1.x |
gnu / glibc | 2.1.1 | 2.1.1.x |
gnu / glibc | 2.0.3 | 2.0.3.x |
gnu / glibc | 2.3.1 | 2.3.1.x |
gnu / glibc | 2.3 | 2.3.x |
gnu / glibc | 2.1.1.6 | 2.1.1.6.x |
gnu / glibc | 2.3.10 | 2.3.10.x |
gnu / glibc | 2.4 | 2.4.x |
gnu / glibc | 2.1 | 2.1.x |
gnu / glibc | 2.3.4 | 2.3.4.x |
gnu / glibc | 2.1.9 | 2.1.9.x |
gnu / glibc | 2.3.3 | 2.3.3.x |
gnu / glibc | 2.6.1 | 2.6.1.x |
gnu / glibc | 2.0.1 | 2.0.1.x |
gnu / glibc | 2.10 | 2.10.x |
gnu / glibc | 2.5.1 | 2.5.1.x |
gnu / glibc | 2.6 | 2.6.x |
gnu / glibc | 2.0.4 | 2.0.4.x |
gnu / glibc | 2.0.2 | 2.0.2.x |
gnu / glibc | 2.2.1 | 2.2.1.x |
gnu / glibc | 2.3.2 | 2.3.2.x |
gnu / glibc | 2.3.6 | 2.3.6.x |
gnu / glibc | 2.2.3 | 2.2.3.x |
gnu / glibc | 2.5 | 2.5.x |
gnu / glibc | 2.3.5 | 2.3.5.x |
gnu / glibc | 2.8 | 2.8.x |
gnu / glibc | 2.11.1 | 2.11.1.x |
gnu / glibc | 2.2.4 | 2.2.4.x |
gnu / glibc | 2.1.3 | 2.1.3.x |
gnu / glibc | 2.2 | 2.2.x |