generated from sig_core/wiki-template
Add CVE-2023-4911
This commit is contained in:
parent
94e3e0ac16
commit
c4abc1b08e
23
docs/issues/CVE-2023-4911.md
Normal file
23
docs/issues/CVE-2023-4911.md
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
# CVE-2023-4911: glibc: Looney Tunables: buffer overflow in ld.so leading to privilege escalation
|
||||||
|
|
||||||
|
## Summary
|
||||||
|
|
||||||
|
As described by [Red Hat](https://access.redhat.com/security/cve/CVE-2023-4911) and in [CVE-2023-4911](https://www.cve.org/CVERecord?id=CVE-2023-4911):
|
||||||
|
|
||||||
|
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the `GLIBC_TUNABLES` environment variable. This issue could allow a local attacker to use maliciously crafted `GLIBC_TUNABLES` environment variables when launching binaries with SUID permission to execute code with elevated privileges.
|
||||||
|
|
||||||
|
More detail is available in the [public disclosure](https://www.openwall.com/lists/oss-security/2023/10/03/2) by [Qualys](https://blog.qualys.com/vulnerabilities-threat-research/2023/10/03/cve-2023-4911-looney-tunables-local-privilege-escalation-in-the-glibcs-ld-so), the team who discovered the issue.
|
||||||
|
|
||||||
|
Public disclosure date: October 3, 2023
|
||||||
|
|
||||||
|
## EL9
|
||||||
|
|
||||||
|
Mitigated in version: `2.34-60.el9_2.security.0.2` available October 3, 2023
|
||||||
|
Fixed in version: `glibc-2.34-60.el9_2.7` available October 5, 2023
|
||||||
|
|
||||||
|
Besides the upstream fix, we also retained the mitigation in the [Security SIG package of glibc](packages/glibc.md).
|
||||||
|
|
||||||
|
## EL8
|
||||||
|
|
||||||
|
Fixed in version: `glibc-0:2.28-225.el8_8.6` available October 5, 2023
|
||||||
|
Errata: [RLSA-2023:5455](https://errata.rockylinux.org/RLSA-2023:5455) issued October 7, 2023
|
Loading…
Reference in New Issue
Block a user