Lucene search

K
rockyRockylinux Product ErrataRLSA-2023:5455
HistoryOct 06, 2023 - 10:57 p.m.

glibc security update

2023-10-0622:57:06
Rockylinux Product Errata
errata.rockylinux.org
76
glibc
security update
rocky linux 8
buffer overflow
stack read
privilege escalation
cve
gaih_inet
getaddrinfo
use-after-free

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.016

Percentile

87.4%

An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.

Security Fix(es):

  • glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911)

  • glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527)

  • glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806)

  • glibc: potential use-after-free in gaih_inet() (CVE-2023-4813)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.016

Percentile

87.4%