A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
https://security.netapp.com/advisory/ntap-20231013-0006/
https://security.gentoo.org/glsa/202310-03
https://access.redhat.com/security/cve/CVE-2023-4911
https://access.redhat.com/errata/RHSA-2024:0033
https://access.redhat.com/errata/RHSA-2023:5476
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:5454
https://www.debian.org/security/2023/dsa-5514
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
http://www.openwall.com/lists/oss-security/2023/10/14/6
http://www.openwall.com/lists/oss-security/2023/10/14/5
http://www.openwall.com/lists/oss-security/2023/10/14/3
http://www.openwall.com/lists/oss-security/2023/10/13/11
Published: 2023-10-03
Updated: 2025-05-06
Named Vulnerability: Looney TunablesKnown Exploited Vulnerability (KEV)
Base Score: 6.8
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.75986