GNU C Library 2.39 Released With New Tunables, stdbit.h For ISO C2X

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts
  • sophisticles
    Senior Member
    • Dec 2015
    • 2547

    #11
    Originally posted by aviallon View Post

    Actually, I think that suid programs should link against a formally verified libc, which could be done with relibc + prustli for instance.
    Code that sees that much reuse everywhere really needs formal proof.
    This is why the United States passed the Securing Open Source Act of 2022 and 2023:





    The truth is there are a lot of vulnerabilities in Linux via glibc:

    Explore the CVE-2023-4911 Looney Tunables exploit, a significant flaw in the Linux GLIBC_TUNABLES feature: impact, detection methods & preventive measures


    It's exploits like this one that validated the other poster's claims in his mind. The thing is that this, like most related exploits, is a local privilege escalation vulnerability​, in order to make use of it a person has to be sitting in front of a computer running Linux.

    The danger of exploits like this one to corporations and government agencies is from inside jobs, threat actors that are withing the organization that wish to hurt the entity or steal data.

    It is not possible to pull off these attack vectors remotely.
    Last edited by sophisticles; 01 February 2024, 03:29 PM.

    Comment

    • Nelson
      Junior Member
      • Feb 2014
      • 42

      #12
      Originally posted by sophisticles View Post

      It is not possible to pull off these attack vectors remotely.
      It absolutely is, you have to compromise the system another way remotely first though. Running the web server as a lower privileged user is sort of a classical step to limit the blast radius upon compromise, as an example, this could potentially circumvent that protection.

      its not a “hair on fire” ultra critical exploit, but it’s bad and needs to be addressed.

      Comment

      Working...
      X