Security News > 2023 > October > Make-me-root 'Looney Tunables' security hole on Linux needs your attention
The flaw, dubbed Looney Tunables, arises from the GNU C Library's dynamic loader mishandling of the GLIBC TUNABLES environmental variable.
Because GNU C Library, commonly known as glibc, is found in most Linux systems, this is something of an issue.
Essentially, setting GLIBC TUNABLES to a carefully crafted value can cause a buffer overflow, which could lead to arbitrary code execution within the loader, allowing it to be hijacked.
Most other distributions are said to be affected, though Alpine Linux is not because it uses musl libc rather than glibc. "The presence of a buffer overflow vulnerability in the dynamic loader's handling of the GLIBC TUNABLES environment variable poses significant risks to numerous Linux distributions," said Saeed Abbasi, product manager with Qualys' Threat Research Unit, in the report.
According to Qualys, the GLIBC TUNABLES environment variable provides a way to alter a library's behavior at runtime, without the need for library or application recompilation.
The code for sanitizing GLIBC TUNABLES fails in certain circumstances.
News URL
https://go.theregister.com/feed/www.theregister.com/2023/10/04/linux_looney_tunables_bug/
Related news
- Deepen your knowledge of Linux security (source)
- Oracle Linux 9 Update 5 brings security updates, OpenJDK 17, .NET 9.0 (source)
- Ubuntu Linux impacted by decade-old 'needrestart' flaw that gives root (source)
- 'Alarming' security bugs lay low in Linux's needrestart utility for 10 years (source)
- Discover the future of Linux security (source)
- Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released (source)