Article 6FCC4 "Looney Tunables Vulnerability" in glibc

"Looney Tunables Vulnerability" in glibc

by
baumei
from LinuxQuestions.org on (#6FCC4)
As published by:
"SANS Institute
11200 Rockville Pike, Suite 200, North Bethesda, MD, 20852"

Quote:
Looney Tunables Vulnerability Affects Most Linux Distributions
(October 3 & 4, 2023)
A buffer overflow vulnerability in GNU C Library's (glibc) dynamic loader
affects nearly all Linux distributions. The vulnerability (CVE-2023-4911)
was detected by researchers at Qualys; it can be exploited to attain full
root privileges. The flaw iwas introduced in glibc 2.34 in commit 2ed18ci
in April 2021. Debian, Ubuntu, Fedora, and Gentoo have released updates to
address the issue.

Editor's Note

[Ullrich]
"Just" a privilege escalation, but one that is easy to exploit and affects
most Linux distributions in use right now. Luckily, patches are easily
available. Patch, reboot and move on :)

[Neely]
The issue is a buffer overflow can be caused during ld.so's dynamic
parsing of the environment variable GLIBC_TUNABLES. The researchers were
able to successfully exploit the vulnerability to obtain root privileges
on the default installations of Fedora 37 & 38, Ubuntu 22.04 & 23.04, and
Debian 12 & 13. RedHat has provided a mitigation using a SystemTap script,
a kernel extension, which terminates any setuid program invoked with
GLIBC_TUNABLES in the environment. Note that RHEL 8.4 and older are not
affected.

[snip]
External Content
Source RSS or Atom Feed
Feed Location https://feeds.feedburner.com/linuxquestions/latest
Feed Title LinuxQuestions.org
Feed Link https://www.linuxquestions.org/questions/
Reply 0 comments