A vulnerability in the elf/dl-load.c source code file in the GNU glibc library could allow a local attacker to gain elevated privileges on a targeted system.
The vulnerability is due to improper handling of RPATH or RUNPATH tokens containing $ORIGIN for an AT_SECURE or SUID program by the fillin_rpath function, as defined in the elf/dl-load.c source code file of the affected software. An attacker could exploit the vulnerability by accessing the system and executing an application that submits malicious input to the affected software. A successful exploit could allow the attacker to gain elevated privileges.
Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.
GNU.org has confirmed the vulnerability and released a software patch.