Ad

CVE-2023-4911

HIGH CVSS 3.1: 7.8 EPSS 59.5%
Updated Feb 13, 2026
Canonical
Parameter Value
CVSS 7.8 (HIGH)
Affected Versions 2.34 — 2.39
Fixed In 2.39
Type CWE-122 (Heap-based Buffer Overflow), CWE-787 (Out-of-bounds Write)
Vendor Canonical
Public PoC Yes

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 75

Configuration From (including) Up to (excluding)
Netapp Bootstrap_Os
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
Netapp Hci_Compute_Node
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
Gnu Glibc
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
2.34 2.39
Fedoraproject Fedora
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
Fedoraproject Fedora
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
Fedoraproject Fedora
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder
cpe:2.3:a:redhat:codeready_linux_builder:9.0:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_Eus
cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_Eus
cpe:2.3:a:redhat:codeready_linux_builder_eus:9.2:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_Eus
cpe:2.3:a:redhat:codeready_linux_builder_eus:9.4:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_Eus
cpe:2.3:a:redhat:codeready_linux_builder_eus:9.6:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Arm64
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Arm64_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.6:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Arm64_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Arm64_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4_aarch64:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Arm64_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.6_aarch64:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Ibm_Z_Systems
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Ibm_Z_Systems_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Ibm_Z_Systems_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Ibm_Z_Systems_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Ibm_Z_Systems_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.6_s390x:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Power_Little_Endian
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Power_Little_Endian_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Power_Little_Endian_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Power_Little_Endian_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
Redhat Codeready_Linux_Builder_For_Power_Little_Endian_Eus
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*
Redhat Virtualization
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
Redhat Virtualization_Host
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:9.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.6_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.6_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus_S390x
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Big_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_For_Power_Little_Endian_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_For_Power_Little_Endian_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_For_Power_Little_Endian_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.6_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Tus
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.6:*:*:*:*:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
Netapp H410c_Firmware
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
Netapp H410c
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
Netapp H300s_Firmware
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
Netapp H300s
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
Netapp H500s_Firmware
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
Netapp H500s
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
Netapp H700s_Firmware
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
Netapp H700s
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
Netapp H410s_Firmware
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
Netapp H410s
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
Netapp Ontap_Select_Deploy_Administration_Utility
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*

References 27

https://access.redhat.com/errata/RHSA-2023:5453
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:5454
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:5455
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:5476
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0033
secalert@redhat.com
https://access.redhat.com/security/cve/CVE-2023-4911
secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
secalert@redhat.com
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege…
secalert@redhat.com
https://www.qualys.com/cve-2023-4911/
secalert@redhat.com
http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalat…
af854a3a-2127-422b-91ae-364da2661108
http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation…
af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2023/Oct/11
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/03/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/03/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/05/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/13/11
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/14/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/14/5
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2023/10/14/6
af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
af854a3a-2127-422b-91ae-364da2661108
https://security.gentoo.org/glsa/202310-03
af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20231013-0006/
af854a3a-2127-422b-91ae-364da2661108
https://www.debian.org/security/2023/dsa-5514
af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/52479
af854a3a-2127-422b-91ae-364da2661108
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023…
134c704f-9b21-4f2e-91b3-4a467353bcc0