CVE-2023-4911

NameCVE-2023-4911
DescriptionA buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5514-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glibc (PTS)buster2.28-10+deb10u1fixed
buster (security)2.28-10+deb10u2fixed
bullseye2.31-13+deb11u8fixed
bullseye (security)2.31-13+deb11u9fixed
bookworm2.36-9+deb12u4fixed
bookworm (security)2.36-9+deb12u6fixed
sid, trixie2.37-18fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glibcsourcebuster(not affected)
glibcsourcebullseye2.31-13+deb11u7DSA-5514-1
glibcsourcebookworm2.36-9+deb12u3DSA-5514-1
glibcsource(unstable)2.37-12

Notes

[buster] - glibc <not-affected> (Vulnerable code introduced later)
https://www.openwall.com/lists/oss-security/2023/10/03/2
Introduced by: https://sourceware.org/git/?p=glibc.git;a=commit;h=2ed18c5b534d9e92fc006202a5af0df6b72e7aca (glibc-2.34; backported in debian/2.31-12)
Fixed by: https://sourceware.org/git/?p=glibc.git;a=commit;h=1056e5b4c3f2d90ed2b4a55f96add28da2f4c8fa
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2023-0004

Search for package or bug name: Reporting problems