A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
References
Link Providers
http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html cve-icon
http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html cve-icon
http://seclists.org/fulldisclosure/2023/Oct/11 cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/2 cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/3 cve-icon
http://www.openwall.com/lists/oss-security/2023/10/05/1 cve-icon
http://www.openwall.com/lists/oss-security/2023/10/13/11 cve-icon
http://www.openwall.com/lists/oss-security/2023/10/14/3 cve-icon
http://www.openwall.com/lists/oss-security/2023/10/14/5 cve-icon
http://www.openwall.com/lists/oss-security/2023/10/14/6 cve-icon
https://access.redhat.com/errata/RHSA-2023:5453 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5454 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5455 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5476 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0033 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2023-4911 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2238352 cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/[email protected]/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/ cve-icon
https://lists.fedoraproject.org/archives/list/[email protected]/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/ cve-icon
https://lists.fedoraproject.org/archives/list/[email protected]/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/ cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2023-4911 cve-icon
https://security.gentoo.org/glsa/202310-03 cve-icon
https://security.netapp.com/advisory/ntap-20231013-0006/ cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cve.org/CVERecord?id=CVE-2023-4911 cve-icon
https://www.debian.org/security/2023/dsa-5514 cve-icon
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt cve-icon cve-icon cve-icon
https://www.qualys.com/cve-2023-4911/ cve-icon cve-icon cve-icon
History

Fri, 22 Nov 2024 12:00:00 +0000


Tue, 17 Sep 2024 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Canonical
Canonical ubuntu Linux
Debian
Debian debian Linux
CPEs cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
Vendors & Products Canonical
Canonical ubuntu Linux
Debian
Debian debian Linux

Mon, 16 Sep 2024 14:45:00 +0000


Wed, 14 Aug 2024 01:00:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2023-10-03T17:25:08.434Z

Updated: 2024-11-23T01:12:42.567Z

Reserved: 2023-09-12T13:10:32.495Z

Link: CVE-2023-4911

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-03T18:15:10.463

Modified: 2024-11-21T08:36:14.780

Link: CVE-2023-4911

cve-icon Redhat

Severity : Important

Publid Date: 2023-10-03T17:00:00Z

Links: CVE-2023-4911 - Bugzilla