CVE-2011-1658

Publication date 8 April 2011

Last updated 24 July 2024


Ubuntu priority

Negligible

Why this priority?

ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or (2) setgid program with this RPATH value, and then executing the program with a crafted value for the LD_PRELOAD environment variable, a different vulnerability than CVE-2010-3847 and CVE-2011-0536. NOTE: it is not expected that any standard operating-system distribution would ship an applicable setuid or setgid program.

Read the notes from the security team

Status

Package Ubuntu Release Status
eglibc 11.10 oneiric
Fixed 2.13-20ubuntu5.1
11.04 natty
Fixed 2.13-0ubuntu13.1
10.10 maverick
Fixed 2.12.1-0ubuntu10.4
10.04 LTS lucid
Fixed 2.11.1-0ubuntu7.10
9.10 karmic Ignored end of life
8.04 LTS hardy Not in release
6.06 LTS dapper Not in release
glibc 11.10 oneiric Not in release
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid Not in release
9.10 karmic Not in release
8.04 LTS hardy
Fixed 2.7-10ubuntu8.1
6.06 LTS dapper Ignored end of life

Notes


sbeattie

there *may* be reggressions introduced by the 3 commits below that are addressed by the following commits. http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=47c3cd7a74e8c089d60d603afce6d9cf661178d6;hp=d08055417d0187875806161fab8c4777adfb7ba8 http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=22836f52e3e4740e450f9b93a2f1e31a90b168a6;hp=7b3b0b2a63f7e980adb630550c0dc9639ec09d7f

References

Related Ubuntu Security Notices (USN)

    • USN-1396-1
    • GNU C Library vulnerabilities
    • 9 March 2012

Other references