A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
https://securelist.com/exploits-and-vulnerabilities-q3-2024/114839/
https://www.ic3.gov/Media/News/2024/241010.pdf
https://www.debian.org/security/2023/dsa-5514
https://security.netapp.com/advisory/ntap-20231013-0006/
https://security.gentoo.org/glsa/202310-03
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://access.redhat.com/security/cve/CVE-2023-4911
https://access.redhat.com/errata/RHSA-2024:0033
https://access.redhat.com/errata/RHSA-2023:5476
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:5454
https://access.redhat.com/errata/RHSA-2023:5453
http://www.openwall.com/lists/oss-security/2023/10/14/6
http://www.openwall.com/lists/oss-security/2023/10/14/5
http://www.openwall.com/lists/oss-security/2023/10/14/3
http://www.openwall.com/lists/oss-security/2023/10/13/11