Security issues in the GNU C library (gblic) can be disastrous for Linux users. An example of this is CVE-2021-33574, a vulnerability that would have allowed threat actors to cause all sorts of flaws in Linux applications. While the flaw was addressed, the implementation of this fix led to the discovery of CVE-2021-38604, an even more dangerous vulnerability.

In analyzing the aforementioned patch, researcher Nikita Popov discovered that it was possible to lead to a segmentation scenario within the affected library, which could lead to a much easier to exploit denial of service (DoS) condition than the initially fixed vulnerability.

According to a Red Hat report, the flaw received a score of 7.5/10 according to the Common Vulnerability Scoring System (CVSS) and can be exploited by users without high privileges, so it is considered a high-severity flaw. On the other hand, Popov believes that this flaw could affect all Linux applications, including interpreters of other languages such as Python or PHP, as they are related to glibc.

The researcher adds that this problem was found during a routine analysis, when it was discovered that null pointers could be passed in certain situations. To be precise, this problem lies in the ‘mq_’ family of functions, which provide POSIX-compliant message queuing API capabilities, something shared by all Linux language interpreters.

Popov encountered two scenarios in which the Linux kernel might use the message NOTIFY_REMOVED when passing thread attributes copied to the data.attr field. Unfortunately, a host application can pass a null value there if it wants glibc to generate a thread with default attributes. In this case, glibc would remove the reference from a NULL pointer in pthread_attr_destroy, blocking all system processes.

Linux distribution developers are discussing the best possible way to address this issue, ironically generated by a security update. In the meantime, users of affected deployments are encouraged to upgrade to the latest version of glibc.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post Critical vulnerability affects every Linux application including interpreters of other languages like PHP, Python and any language linked to glibc appeared first on Information Security Newspaper | Hacking News.

You May Also Like

3 unpatched vulnerabilities in Philips MRI 1.5T and 3T machines allow leaking confidential health data

Information security specialists report the detection of three vulnerabilities in MRI 1.5T…

8 critical vulnerabilities in GitLab would allow hackers to install backdoors in your code

In its most recent security release, GitLab announced the launching of GitLab…

Security researcher finds new way to exploit CVE-2022-22005, recently patched deserialization bug in Microsoft SharPoint

In early 2022, Microsoft addressed CVE-2022-22005, a remote code execution (RCE) vulnerability…

4 new vulnerabilities in SonicWall SonicOS affect firewalls and other security products: Patch immediately

A recent cybersecurity report revealed the patching of at least four vulnerabilities…