Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 386333 (CVE-2011-1658) - <sys-libs/glibc-2.14.1-r3: Privilege escalation (CVE-2011-1658)
Summary: <sys-libs/glibc-2.14.1-r3: Privilege escalation (CVE-2011-1658)
Alias: CVE-2011-1658
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
Whiteboard: A2 [glsa]
Depends on:
Reported: 2011-10-08 14:37 UTC by GLSAMaker/CVETool Bot
Modified: 2013-12-03 04:14 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2011-10-08 14:37:19 UTC
CVE-2011-1658 ( in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the
  $ORIGIN dynamic string token when RPATH is composed entirely of this token,
  which might allow local users to gain privileges by creating a hard link in
  an arbitrary directory to a (1) setuid or (2) setgid program with this RPATH
  value, and then executing the program with a crafted value for the
  LD_PRELOAD environment variable, a different vulnerability than
  CVE-2010-3847 and CVE-2011-0536.  NOTE: it is not expected that any standard
  operating-system distribution would ship an applicable setuid or setgid

With regard to the $ORIGIN debate from a while ago, I'd rather ask despite the "NOTE": Is Gentoo affected by this? Please not that this is apparently not the same issue.
Comment 1 SpanKY gentoo-dev 2012-04-13 23:54:27 UTC
should be addressed in glibc-2.14.1+
Comment 3 Mark Loeser (RETIRED) gentoo-dev 2013-02-22 23:25:58 UTC
toolchain done
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2013-12-03 04:14:33 UTC
This issue was resolved and addressed in
 GLSA 201312-01 at
by GLSA coordinator Chris Reffett (creffett).