Navigation
Recherche
|
A locally exploitable glibc vulnerability
mercredi 31 janvier 2024, 17:25 , par LWN.net
Qualys has disclosed
a vulnerability in the GNU C Library that can be exploited by a local attacker for root access. It was introduced in the 2.37 release, and also backported to 2.36. For example, we confirmed that Debian 12 and 13, Ubuntu 23.04 and 23.10, and Fedora 37 to 39 are vulnerable to this buffer overflow. Furthermore, we successfully exploited an up-to-date, default installation of Fedora 38 (on amd64): a Local Privilege Escalation, from any unprivileged user to full root. Other distributions are probably also exploitable. Vulnerable systems with untrusted users should probably be updated in a timely manner.
https://lwn.net/Articles/960289/
Voir aussi |
56 sources (32 en français)
Date Actuelle
sam. 4 mai - 22:32 CEST
|