CVE-2015-8777
Description
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A local user can disable glibc's pointer guard protection by setting LD_POINTER_GUARD to zero, weakening security for set-user-ID programs.
Vulnerability
The vulnerability resides in the process_envvars function in elf/rtld.c of the GNU C Library (glibc) before version 2.23. The function fails to sanitize the LD_POINTER_GUARD environment variable for set-user-ID and set-group-ID programs. By setting LD_POINTER_GUARD=0, a local user can disable the pointer mangling protection mechanism that is intended to protect pointers stored in writable memory (e.g., return addresses saved by setjmp(3) or function pointers used by glibc internals) [3]. Affected versions include glibc prior to 2.22.90 [3] and RHEL 7 glibc before 2.17-196.el7 [1].
Exploitation
An attacker must have local access to the system and be able to execute a set-user-ID or set-group-ID program. The attacker sets the environment variable LD_POINTER_GUARD=0 before launching the privileged program. The dynamic loader processes this variable without checking for elevated privileges, thus disabling pointer mangling for that process [3]. No additional authentication or user interaction is required beyond the ability to run a set-user-ID binary.
Impact
By disabling pointer guard, the attacker weakens the system's security posture. However, this vulnerability alone does not directly allow code execution or privilege escalation; it removes a protective layer that makes it easier to exploit other memory corruption bugs (e.g., buffer overflows) that could overwrite mangled pointers [3]. The impact is a reduction in the effectiveness of pointer mangling as a defense-in-depth measure, potentially facilitating further attacks.
Mitigation
The fix is included in glibc version 2.23 [2]. For Red Hat Enterprise Linux 7, the updated package is glibc-2.17-196.el7 [1]. Ubuntu released USN-2985-1 and later USN-2985-2 to address related glibc issues, though the latter removed a fix for CVE-2014-9761 due to a regression [4]. Users should update to the latest glibc version provided by their distribution. No workaround is available other than applying the patch.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
21- osv-coords19 versionspkg:rpm/opensuse/glibc&distro=openSUSE%20Tumbleweedpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1
< 2.24-2.3+ 18 more
- (no CPE)range: < 2.24-2.3
- (no CPE)range: < 2.11.3-17.95.2
- (no CPE)range: < 2.11.3-17.95.2
- (no CPE)range: < 2.19-22.13.1
- (no CPE)range: < 2.19-35.1
- (no CPE)range: < 2.11.3-17.45.66.1
- (no CPE)range: < 2.11.3-17.95.2
- (no CPE)range: < 2.11.3-17.95.2
- (no CPE)range: < 2.11.3-17.95.2
- (no CPE)range: < 2.19-22.13.1
- (no CPE)range: < 2.19-35.1
- (no CPE)range: < 2.11.3-17.95.2
- (no CPE)range: < 2.11.3-17.95.2
- (no CPE)range: < 2.19-22.13.1
- (no CPE)range: < 2.19-35.1
- (no CPE)range: < 2.11.3-17.95.2
- (no CPE)range: < 2.11.3-17.95.2
- (no CPE)range: < 2.19-22.13.1
- (no CPE)range: < 2.19-35.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- hmarco.org/bugs/glibc_ptr_mangle_weakness.htmlnvdExploit
- lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.htmlnvd
- www.debian.org/security/2016/dsa-3480nvd
- www.openwall.com/lists/oss-security/2016/01/20/1nvd
- www.securityfocus.com/bid/81469nvd
- www.securitytracker.com/id/1034811nvd
- www.ubuntu.com/usn/USN-2985-1nvd
- www.ubuntu.com/usn/USN-2985-2nvd
- access.redhat.com/errata/RHSA-2017:1916nvd
- security.gentoo.org/glsa/201702-11nvd
- sourceware.org/bugzilla/show_bug.cginvd
News mentions
0No linked articles in our index yet.