Description
ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2122-1 | New glibc packages fix local privilege escalation |
Debian DSA |
DSA-2122-2 | New glibc packages fix privilege escalation |
EUVD |
EUVD-2010-3835 | ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so. |
Ubuntu USN |
USN-1009-1 | GNU C Library vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-02-13T16:27:09.107Z
Reserved: 2010-10-08T00:00:00.000Z
Link: CVE-2010-3856
No data.
Status : Modified
Published: 2011-01-07T19:00:17.843
Modified: 2026-04-29T01:13:23.040
Link: CVE-2010-3856
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN