Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 915127 (CVE-2023-4911) - <sys-libs/glibc-{2.37-r7,2.38-r5}: Local Privilege Escalation in ld.so
Summary: <sys-libs/glibc-{2.37-r7,2.38-r5}: Local Privilege Escalation in ld.so
Status: RESOLVED FIXED
Alias: CVE-2023-4911
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal critical
Assignee: Gentoo Security
URL: https://www.openwall.com/lists/oss-se...
Whiteboard: A1 [glsa+]
Keywords:
Depends on: 915142
Blocks:
  Show dependency tree
 
Reported: 2023-10-03 17:58 UTC by Sam James
Modified: 2023-11-12 08:44 UTC (History)
8 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2023-10-03 17:58:11 UTC
See https://www.openwall.com/lists/oss-security/2023/10/03/2.

"""
========================================================================
Summary
========================================================================

The GNU C Library's dynamic loader "find[s] and load[s] the shared
objects (shared libraries) needed by a program, prepare[s] the program
to run, and then run[s] it" (man ld.so). The dynamic loader is extremely
security sensitive, because its code runs with elevated privileges when
a local user executes a set-user-ID program, a set-group-ID program, or
a program with capabilities. Historically, the processing of environment
variables such as LD_PRELOAD, LD_AUDIT, and LD_LIBRARY_PATH has been a
fertile source of vulnerabilities in the dynamic loader.

Recently, we discovered a vulnerability (a buffer overflow) in the
dynamic loader's processing of the GLIBC_TUNABLES environment variable
(https://www.gnu.org/software/libc/manual/html_node/Tunables.html). This
vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c
("Fix SXID_ERASE behavior in setuid programs (BZ #27471)").

We successfully exploited this vulnerability and obtained full root
privileges on the default installations of Fedora 37 and 38, Ubuntu
22.04 and 23.04, Debian 12 and 13; other distributions are probably also
vulnerable and exploitable (one notable exception is Alpine Linux, which
uses musl libc, not the glibc). We will not publish our exploit for now;
however, this buffer overflow is easily exploitable (by transforming it
into a data-only attack), and other researchers might publish working
exploits shortly after this coordinated disclosure.
"""
Comment 1 Larry the Git Cow gentoo-dev 2023-10-03 18:06:17 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=cf5480111cf4da127f6089fef7c2880e4f03cb48

commit cf5480111cf4da127f6089fef7c2880e4f03cb48
Author:     Andreas K. Hüttel <dilfridge@gentoo.org>
AuthorDate: 2023-10-03 18:05:32 +0000
Commit:     Andreas K. Hüttel <dilfridge@gentoo.org>
CommitDate: 2023-10-03 18:05:32 +0000

    sys-libs/glibc: 2.37 patchlevel 10 bump
    
    Bug: https://bugs.gentoo.org/915127
    Signed-off-by: Andreas K. Hüttel <dilfridge@gentoo.org>

 sys-libs/glibc/Manifest             |    1 +
 sys-libs/glibc/glibc-2.37-r7.ebuild | 1680 +++++++++++++++++++++++++++++++++++
 2 files changed, 1681 insertions(+)
Comment 2 Larry the Git Cow gentoo-dev 2023-10-03 18:11:56 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=0e9ec2c1795c6528ca1ef440a45b0be7d3ff2d6e

commit 0e9ec2c1795c6528ca1ef440a45b0be7d3ff2d6e
Author:     Andreas K. Hüttel <dilfridge@gentoo.org>
AuthorDate: 2023-10-03 18:11:18 +0000
Commit:     Andreas K. Hüttel <dilfridge@gentoo.org>
CommitDate: 2023-10-03 18:11:45 +0000

    sys-libs/glibc: 2.38 patchlevel 5 bump
    
    Bug: https://bugs.gentoo.org/915127
    Signed-off-by: Andreas K. Hüttel <dilfridge@gentoo.org>

 sys-libs/glibc/Manifest             |    1 +
 sys-libs/glibc/glibc-2.38-r5.ebuild | 1706 +++++++++++++++++++++++++++++++++++
 2 files changed, 1707 insertions(+)
Comment 3 Larry the Git Cow gentoo-dev 2023-10-03 21:13:55 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=9dac73faec799d2c7240f5545582cf70b8e33c49

commit 9dac73faec799d2c7240f5545582cf70b8e33c49
Author:     Andreas K. Hüttel <dilfridge@gentoo.org>
AuthorDate: 2023-10-03 21:13:19 +0000
Commit:     Andreas K. Hüttel <dilfridge@gentoo.org>
CommitDate: 2023-10-03 21:13:45 +0000

    sys-libs/glibc: keyword 2.37-r7
    
    Bug: https://bugs.gentoo.org/915127
    Signed-off-by: Andreas K. Hüttel <dilfridge@gentoo.org>

 sys-libs/glibc/glibc-2.37-r7.ebuild | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
Comment 4 Larry the Git Cow gentoo-dev 2023-10-03 21:41:43 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7d47811b1b91485d359aa8bdeab275a82a105e73

commit 7d47811b1b91485d359aa8bdeab275a82a105e73
Author:     Sam James <sam@gentoo.org>
AuthorDate: 2023-10-03 21:41:08 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2023-10-03 21:41:08 +0000

    sys-libs/glibc: keyword 2.38-r5
    
    Bug: https://bugs.gentoo.org/915127
    Signed-off-by: Sam James <sam@gentoo.org>

 sys-libs/glibc/glibc-2.38-r5.ebuild | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2023-10-03 21:50:15 UTC
GLSA request filed.
Comment 6 Larry the Git Cow gentoo-dev 2023-10-04 08:02:47 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=029e12731f29676d3f6ebed09f7747ee6e15c5e8

commit 029e12731f29676d3f6ebed09f7747ee6e15c5e8
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2023-10-04 08:02:08 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2023-10-04 08:02:41 +0000

    [ GLSA 202310-03 ] glibc: Multiple vulnerabilities
    
    Bug: https://bugs.gentoo.org/867952
    Bug: https://bugs.gentoo.org/914281
    Bug: https://bugs.gentoo.org/915127
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Sam James <sam@gentoo.org>

 glsa-202310-03.xml | 47 +++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 47 insertions(+)