Skip to content

Commit

Permalink
Merge pull request #30 from adciu/master
Browse files Browse the repository at this point in the history
OSG-SEC-2023-10-09 changes
  • Loading branch information
jcdrake authored Oct 16, 2023
2 parents 1ea3ccb + 11e4653 commit 92392f5
Show file tree
Hide file tree
Showing 2 changed files with 33 additions and 0 deletions.
1 change: 1 addition & 0 deletions docs/OSGSecurityAnnouncements.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@

| Date | Title | Contents/Link | Risk |
|-------------|-------------------------------------------------------|---------------------|---------------|
| 2023-10-11 | HIGH Severity GNU C Library Privilege Escalation | [OSG-SEC-2023-10-09](./vulns/OSG-SEC-2023-10-09.md) | |
| 2023-09-26 | CRITICAL PMIx race condition vulnerability affecting Slurm | [OSG-SEC-2023-09-26](./vulns/OSG-SEC-2023-09-26.md) | |
| 2023-09-25 | HIGH Multiple Linux Kernel Vulnerabilities | [OSG-SEC-2023-09-25](./vulns/OSG-SEC-2023-09-25.md) | |
| 2023-08-01 | MEDIUM OpenJDK TLS vulnerability | [OSG-SEC-2023-08-01](./vulns/OSG-SEC-2023-08-01.md) | |
Expand Down
32 changes: 32 additions & 0 deletions docs/vulns/OSG-SEC-2023-10-09.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
# OSG-SEC-2023-10-09 HIGH Severity GNU C Library Privilege Escalation

Dear OSG Security Contacts,

A HIGH risk buffer overflow vulnerability was identified in GNU C Library's dynamic loader ld.so which may lead to privilege escalation. [1] [2].

## IMPACTED VERSIONS:

This affects RHEL8, RHEL9 and derivatives, but not RHEL7.

## WHAT ARE THE VULNERABILITIES:

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

## WHAT YOU SHOULD DO:

Where possible, sites running vulnerable versions should update as soon as possible. Note that updating will require a reboot of affected systems [5]. See references below.

Sites also have the option of mitigation [2], however, the mitigation suggested does not persist after a restart, and so updating to a patched version as soon as possible is recommended.

## REFERENCES

Thanks to the EGI SVG for bringing this vulnerability to our attention.

[1] https://nvd.nist.gov/vuln/detail/CVE-2023-4911
[2] https://access.redhat.com/security/cve/CVE-2023-4911
[3] https://lists.centos.org/pipermail/centos-announce/
[4] https://errata.almalinux.org/
[5] https://access.redhat.com/solutions/27943

Please contact the OSG security team at [email protected] if you have any questions or concerns.
OSG Security Team

0 comments on commit 92392f5

Please sign in to comment.