⚠ Actively exploited
Added to CISA KEV on 2023-11-21. Federal agencies required to patch by 2023-12-12. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..
CVE-2023-4911
Severity
7.8HIGH
EPSS
74.3%
top 1.16%
CISA KEV
KEV
Added 2023-11-21
Due 2023-12-12
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedOct 3
KEV addedNov 21
KEV dueDec 12
Latest updateFeb 11
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages7 packages
Also affects: Debian Linux 11.0, 12.0, Fedora 37, 38, 39, Ubuntu Linux 22.04, 23.04, Enterprise Linux 8.0, 9.0, 8.6, 9.2, 9.4, 9.6
Patches
🔴Vulnerability Details
5GHSA▶
GHSA-m77w-6vjw-wh2f: A buffer overflow was discovered in the GNU C Library's dynamic loader ld↗2023-10-03
OSV
▶