CVE-2023-4911

HIGH CVSS 3.1: 7,8 EPSS 59.5%
Обновлено 13 февраля 2026
Canonical
Параметр Значение
CVSS 7,8 (HIGH)
Уязвимые версии 2.34 — 2.39
Устранено в версии 2.39
Тип уязвимости CWE-122 (Переполнение буфера в куче), CWE-787 (Запись за пределами буфера)
Поставщик Canonical
Публичный эксплойт Да

Переполнение буфера было обнаружено в динамическом загрузчике ld.so библиотеки GNU C при обработке переменной среды GLIBC_TUNABLES. Эта проблема может позволить локальному злоумышленнику использовать злонамеренно созданные переменные среды GLIBC_TUNABLES при запуске двоичных файлов с разрешением SUID для выполнения кода с повышенными привилегиями.

Показать оригинальное описание (EN)

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

Характеристики атаки

Способ атаки
Локальный
Нужен локальный доступ
Сложность
Низкая
Легко эксплуатировать
Нужны права
Низкие
Нужны базовые права
Участие пользователя
Не требуется
Не нужно действие пользователя

Последствия

Конфиденциальность
Высокое
Полная утечка данных
Целостность
Высокое
Полная модификация данных
Доступность
Высокое
Полный отказ в обслуживании

Строка CVSS v3.1

Уязвимые продукты 75

Конфигурация От (включительно) До (исключительно)
Netapp Bootstrap_Os
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
Netapp Hci_Compute_Node
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
Gnu Glibc
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
2.34 2.39
Fedoraproject Fedora
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
Fedoraproject Fedora
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
Fedoraproject Fedora
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder
cpe:2.3:a:redhat:codeready_linux_builder:9.0:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_Eus
cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_Eus
cpe:2.3:a:redhat:codeready_linux_builder_eus:9.2:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_Eus
cpe:2.3:a:redhat:codeready_linux_builder_eus:9.4:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_Eus
cpe:2.3:a:redhat:codeready_linux_builder_eus:9.6:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Arm64
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Arm64_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.6:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Arm64_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Arm64_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4_aarch64:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Arm64_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.6_aarch64:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Ibm_Z_Systems
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Ibm_Z_Systems_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Ibm_Z_Systems_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Ibm_Z_Systems_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Ibm_Z_Systems_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.6_s390x:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Power_Little_Endian
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Power_Little_Endian_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Power_Little_Endian_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Power_Little_Endian_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Power_Little_Endian_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*
Redhat Virtualization
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
Redhat Virtualization_Host
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:9.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.6_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.6_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus_S390x
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Big_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_For_Power_Little_Endian_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_For_Power_Little_Endian_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_For_Power_Little_Endian_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.6_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Tus
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.6:*:*:*:*:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
Netapp H410c_Firmware
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
Netapp H410c
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
Netapp H300s_Firmware
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
Netapp H300s
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
Netapp H500s_Firmware
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
Netapp H500s
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
Netapp H700s_Firmware
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
Netapp H700s
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
Netapp H410s_Firmware
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
Netapp H410s
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
Netapp Ontap_Select_Deploy_Administration_Utility
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*

Ссылки 27

https://access.redhat.com/errata/RHSA-2023:5453
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:5454
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:5455
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:5476
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0033
secalert@redhat.com
https://access.redhat.com/security/cve/CVE-2023-4911
secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
secalert@redhat.com
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege…
secalert@redhat.com
https://www.qualys.com/cve-2023-4911/
secalert@redhat.com
http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalat…
af854a3a-2127-422b-91ae-364da2661108
http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation…
af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2023/Oct/11
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/03/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/03/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/05/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/13/11
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/14/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/14/5
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/14/6
af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
af854a3a-2127-422b-91ae-364da2661108
https://security.gentoo.org/glsa/202310-03
af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20231013-0006/
af854a3a-2127-422b-91ae-364da2661108
https://www.debian.org/security/2023/dsa-5514
af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/52479
af854a3a-2127-422b-91ae-364da2661108
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023…
134c704f-9b21-4f2e-91b3-4a467353bcc0