CVE-2023-4911

high

Description

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

References

https://blog.qualys.com/vulnerabilities-threat-research/2023/10/03/cve-2023-4911-looney-tunables-local-privilege-escalation-in-the-glibcs-ld-so

https://www.qualys.com/cve-2023-4911/

https://www.debian.org/security/2023/dsa-5514

https://security.netapp.com/advisory/ntap-20231013-0006/

https://security.gentoo.org/glsa/202310-03

https://lists.fedoraproject.org/archives/list/[email protected]/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/

https://lists.fedoraproject.org/archives/list/[email protected]/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/

https://bugzilla.redhat.com/show_bug.cgi?id=2238352

https://access.redhat.com/security/cve/CVE-2023-4911

https://access.redhat.com/errata/RHSA-2024:0033

https://access.redhat.com/errata/RHSA-2023:5476

https://access.redhat.com/errata/RHSA-2023:5455

https://access.redhat.com/errata/RHSA-2023:5454

https://access.redhat.com/errata/RHSA-2023:5453

http://www.openwall.com/lists/oss-security/2023/10/14/6

http://www.openwall.com/lists/oss-security/2023/10/14/5

http://www.openwall.com/lists/oss-security/2023/10/14/3

http://www.openwall.com/lists/oss-security/2023/10/13/11

http://www.openwall.com/lists/oss-security/2023/10/05/1

http://www.openwall.com/lists/oss-security/2023/10/03/3

Details

Source: Mitre, NVD

Published: 2023-10-03

Updated: 2024-02-22

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High