Close Menu
Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Subscribe
    • Home
    • Top News
    • World
    • Economy
    • Science
    • Tech
    • Sport
    • Entertainment
    • Contact Form
    Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Home»Tech»Linux: Vulnerability in glibc gives attackers root privileges
    Tech

    Linux: Vulnerability in glibc gives attackers root privileges

    Theodore MeeksBy Theodore MeeksJanuary 31, 2024No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email
    Linux: Vulnerability in glibc gives attackers root privileges
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Three new vulnerabilities in the Linux central library glibc are currently worrying developers and distributors of the open source operating system. Security leaks allow users to escalate their own privileges and, after several attempts, execute code with the privileges of the “root” administrative user. Major Linux distributions have already responded and released updated packages.

    advertisement

    According to the finders from Qualys Labs, they encountered a bug in the __vsyslog_internal() helper function, which is called by glibc logging functions and appears to have been dormant in the library code since August 2022. Ironically, the bug arose due to a fix for another security issue in the same feature.

    The issue, which researchers were able to understand in Debian versions 12 and 13, Ubuntu 23.04 and 23.10, and Fedora 37 to 39, is based on a buffer overflow and, with some modifications, can be used to execute your own commands as “root.” . Fortunately, experts say, the vulnerability cannot be exploited remotely; A local user account is a necessary requirement.

    This situation also affects the risk assessment for CVE-2023-6246, which is… high Risks arise. Although no official CVSS value is known, the score with known details is 7.8/10 (CVSS vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C).

    Vulnerability testing with 128,000 zeros

    Using Bash, administrators can test whether their system is still affected or has already been patched. However, as with any “proof of concept,” caution is advised: unwanted side effects cannot always be ruled out.

    (exec -a "`printf '%0128000x' 1`" /usr/bin/su < /dev/null)

    After entering this line as a normal user on a vulnerable system, the typical password prompt appears briefly and then suddenly the message “Segmentation fault (core dumped)“.

    Major Linux distributions Debian and Fedora responded with their own security advisories and provided updated glibc packages. These also typically fix two minor vulnerabilities in glibc, which have the CVE IDs CVE-2023-6779 and CVE-2023-6780. No current Ubuntu package has been released yet, and the virtual machine that is updated daily by the Heise Security editorial team is still vulnerable.

    The Linux glibc library is one of the central components of the operating system along with the kernel, which makes vulnerabilities of great importance. Last year, Qualys discovered the “Looney Tunables” program, which also enabled the expansion of local user rights.


    (Kaku)

    To the home page

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Theodore Meeks

    Lifelong foodaholic. Professional twitter expert. Organizer. Award-winning internet geek. Coffee advocate.

    Related Posts

    Neodymium Magnet Uses and Safety Tips for 2025

    October 4, 2025

    Halifax Stanfield Airport Pilots Passenger Service Robots in Bid to Boost Traveler Experience

    August 25, 2025

    Battery miracle in test – HP Omnibook X AI: If it takes longer again

    August 29, 2024
    Navigate
    • Home
    • Top News
    • World
    • Economy
    • Science
    • Tech
    • Sport
    • Entertainment
    • Contact Form
    Pages
    • About Us
    • DMCA
    • Contact Form
    • Privacy Policy
    • Editorial Policy
    STAY UPTODATE

    Get the Latest News With Aviationanalysis.net

    OFFICE

    X. Herald Inc.
    114 5th Ave New York,
    NY 10011, United States

    QUERIES?

    Do you have any queries? Feel free to contact us via our Contact Form

    Visit Our Office

    X. Herald Inc.
    114 5th Ave New York,
    NY 10011, United States

    • About Us
    • DMCA
    • Contact Form
    • Privacy Policy
    • Editorial Policy
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.