The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libc6-dbg": "2.18-0ubuntu1", "libc6": "2.18-0ubuntu1", "libc6-xen": "2.18-0ubuntu1", "libc6-dev": "2.18-0ubuntu1", "libc-bin": "2.18-0ubuntu1", "libc6-i386": "2.18-0ubuntu1", "libc6-udeb": "2.18-0ubuntu1", "libc6-ppc64": "2.18-0ubuntu1", "libc6-dev-x32": "2.18-0ubuntu1", "eglibc-source": "2.18-0ubuntu1", "multiarch-support": "2.18-0ubuntu1", "libc-dev-bin": "2.18-0ubuntu1", "libc6-amd64": "2.18-0ubuntu1", "libnss-dns-udeb": "2.18-0ubuntu1", "libc6-x32": "2.18-0ubuntu1", "libnss-files-udeb": "2.18-0ubuntu1", "libc6-prof": "2.18-0ubuntu1", "libc6-dev-amd64": "2.18-0ubuntu1", "libc6-pic": "2.18-0ubuntu1", "libc6-dev-i386": "2.18-0ubuntu1", "libc6-dev-armel": "2.18-0ubuntu1", "libc6-dev-ppc64": "2.18-0ubuntu1", "nscd": "2.18-0ubuntu1", "glibc-doc": "2.18-0ubuntu1", "libc6-armel": "2.18-0ubuntu1" } ] }