LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-03-2023, 03:03 PM   #1
biker_rat
Member
 
Registered: Feb 2010
Posts: 370

Rep: Reputation: 220Reputation: 220Reputation: 220
Terrible security hole Tuesday today


Check out phoronix.com glibc has had a big security flaw since 2.34, big enough for critical Debian Servers to go "shields up" until patched.
X also has a few vulnerabilities in it that have gone undiscovered since I was grad school ( I saw Jerry Garcia live my freshman year and he had years of touring left in him).
 
Old 10-03-2023, 04:32 PM   #2
boughtonp
Senior Member
 
Registered: Feb 2007
Location: UK
Distribution: Debian
Posts: 3,616

Rep: Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555

Here's some actual information:
* Qualys announced a Local Privilege Escalation in the glibc's ld.so that grants full root privileges.
* Most distros use glibc and will be affected - Debian, Fedora and Ubuntu, were all cited, but only a few (like Alpine) do not use glibc and so will avoid the issue.
* Security code is CVE-2023-4911

It is not specific to glibc 2.34 - there are patches for 2.31 in Debian 11 Bullseye and 2.36 in Debian 12 Bookworm both released today.
(At time of writing Debian's security tracker shows Testing and Unstable remain vulnerable; a reminder that these are not secure releases but development tools.)

If in doubt, simply make sure your OS has security updates enabled and update.

 
1 members found this post helpful.
Old 10-03-2023, 09:41 PM   #3
biker_rat
Member
 
Registered: Feb 2010
Posts: 370

Original Poster
Rep: Reputation: 220Reputation: 220Reputation: 220
I'm not actually qualified to give actual information so heads up is all I can give.
 
1 members found this post helpful.
Old 10-04-2023, 02:56 PM   #4
jayjwa
Member
 
Registered: Jul 2003
Location: NY
Distribution: Slackware, Termux
Posts: 794

Rep: Reputation: 253Reputation: 253Reputation: 253
I'm guessing Linux caps would be a good way not to have to deal with this? I try to use caps in place of setuid whenever I can.

Code:
Given its role, the dynamic loader is highly security-sensitive, as its code runs with elevated privileges when a local user launches a set-user-ID or set-group-ID program.
This is already patched in my distro. I feel bad for the IT pros that have to patch all those machines and restart all those servers!
 
Old 10-04-2023, 07:21 PM   #5
Jan K.
Member
 
Registered: Apr 2019
Location: Esbjerg
Distribution: Windows 7...
Posts: 773

Rep: Reputation: 489Reputation: 489Reputation: 489Reputation: 489Reputation: 489
The good news are that the X vulnerabilities apparently haven't hit anyone during the past 38 years...
 
Old 10-04-2023, 08:36 PM   #6
craigevil
Senior Member
 
Registered: Apr 2005
Location: OZ
Distribution: Debian Sid/RPIOS
Posts: 4,887
Blog Entries: 28

Rep: Reputation: 534Reputation: 534Reputation: 534Reputation: 534Reputation: 534Reputation: 534
Quote:
Originally Posted by boughtonp View Post
Here's some actual information:
* Qualys announced a Local Privilege Escalation in the glibc's ld.so that grants full root privileges.
* Most distros use glibc and will be affected - Debian, Fedora and Ubuntu, were all cited, but only a few (like Alpine) do not use glibc and so will avoid the issue.
* Security code is CVE-2023-4911

It is not specific to glibc 2.34 - there are patches for 2.31 in Debian 11 Bullseye and 2.36 in Debian 12 Bookworm both released today.
(At time of writing Debian's security tracker shows Testing and Unstable remain vulnerable; a reminder that these are not secure releases but development tools.)

If in doubt, simply make sure your OS has security updates enabled and update.

Debian unstable has :
(Debian GLIBC 2.37-12) 2.37
already updated and fixed.
 
Old 10-06-2023, 06:12 PM   #7
metaed
Member
 
Registered: Apr 2022
Location: US
Distribution: Slackware64 15.0
Posts: 371

Rep: Reputation: 172Reputation: 172
Quote:
Originally Posted by boughtonp View Post
It is not specific to glibc 2.34 - there are patches for 2.31 in Debian 11 Bullseye and 2.36 in Debian 12 Bookworm both released today
Quote:
Originally Posted by https://www.openwall.com/lists/oss-security/2023/10/03/2
This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c ("Fix SXID_ERASE behavior in setuid programs (BZ #27471)").
How can I reconcile these apparently contradictory statements, in particular with reference to pre-2.34 glibc such as 2.31?
Do you conclude that because Debian patched 2.31, 2.31 has the exploit?
My concern arises because I run the stable edition of Slackware-64, version 15.0.
It has a pre-2.34 (2.33) glibc.
 
Old 10-07-2023, 06:46 AM   #8
boughtonp
Senior Member
 
Registered: Feb 2007
Location: UK
Distribution: Debian
Posts: 3,616

Rep: Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555

I conclude that Debian's 2.31-13+deb11u6 has the exploit because Debian released an advisory stating it is vulnerable to the exploit, along with version 2.31-13+deb11u7 to resolve that vulnerability.

If the flaw was introduced in April 2021, then presumably it was carried over with one of the eight updates that Debian's 2.31 received between April 2021 and now.

Whether Slackware's version has the exploit is a question for Slackware's Security Team.

Given that glibc is a core package, the lack of any Slackware security advisory probably means that it does not, but being neither a Slackware user nor on their Security Team, I cannot confirm that.


Last edited by boughtonp; 10-07-2023 at 06:52 AM.
 
Old 10-09-2023, 10:55 AM   #9
metaed
Member
 
Registered: Apr 2022
Location: US
Distribution: Slackware64 15.0
Posts: 371

Rep: Reputation: 172Reputation: 172
Quote:
Originally Posted by boughtonp View Post
Debian released an advisory stating it is vulnerable to the exploit, along with version 2.31-13+deb11u7 to resolve that vulnerability

If the flaw was introduced in April 2021, then presumably it was carried over with one of the eight updates that Debian's 2.31 received between April 2021 and now.
I think you're saying the flaw introduced into glibc 2.34 was probably back-ported by Debian into their copy of 2.31. That clears it up for me, thank you.
 
Old 10-14-2023, 11:11 AM   #10
compis
Member
 
Registered: Sep 2023
Posts: 35

Rep: Reputation: 0
Does Debian provide a documented list of all updates that have been made available to Debian 12? As an example you want to check if all updates have been applied to your system is there a document showing all updates made available ?
 
Old 10-14-2023, 12:13 PM   #11
replica9000
Senior Member
 
Registered: Jul 2006
Distribution: Debian Unstable
Posts: 1,131
Blog Entries: 2

Rep: Reputation: 260Reputation: 260Reputation: 260
Quote:
Originally Posted by compis View Post
Does Debian provide a documented list of all updates that have been made available to Debian 12? As an example you want to check if all updates have been applied to your system is there a document showing all updates made available ?
You can see the history of everything installed, upgraded and removed in the logs in /var/log/apt. You can see the changelog for each package with apt-get changelog <package>. You can also use apt-cache policy <package> to see the currently installed version and the update candidate.
 
Old 10-14-2023, 12:38 PM   #12
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,976

Rep: Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337
based on the documentation here is the way to check it:
Code:
env -i "GLIBC_TUNABLES=glibc.malloc.mxfast=glibc.malloc.mxfast=A" "Z=`printf '%08192x' 1`" /usr/bin/su --help
if the host is vulnerable you will get a segfault, otherwise you will get the normal help page of su.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Google's browser security plan slammed as dangerous, terrible, DRM for websites LXer Syndicated Linux News 0 07-30-2023 01:21 PM
LXer: I'll Gladly Pay You Tuesday for a Hamburger Today LXer Syndicated Linux News 0 09-14-2017 12:03 AM
LXer: Google releases fix to OEMs for Blue Security Android security hole LXer Syndicated Linux News 0 07-08-2013 11:30 PM
getting updates today is IMPOSSIBLE (today)!! mtdew3q SUSE / openSUSE 3 10-17-2007 12:53 AM
howto start a perl script only from tuesday to friday at 8.00 am ? cccc Linux - Newbie 4 03-19-2005 04:23 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:37 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration