LWN.net Logo

glibc: multiple vulnerabilities

Package(s):glibc CVE #(s):CVE-2013-4788 CVE-2013-4332
Created:September 30, 2013 Updated:October 3, 2013
Description: From the OpenWall advisories [1; 2]:

I recently discovered three integer overflow issues in the glibc memory allocator functions pvalloc, valloc and posix_memalign/memalign/aligned_alloc. These issues cause a large allocation size to wrap around and cause a wrong sized allocation and heap corruption. (CVE-2013-4332)

This bug was discovered in March 2013 while we were developing the RAF SSP technique. The glibc bug makes it easy to take advantage of common errors such as buffer overflows allows in these cases redirect the execution flow and potentially execute arbitrary code.

All statically linked applications compiled with glibc and eglibc are affected, independent of the operating system distribution. Note that this problem is not solved by only patching the eglibc, but it is also necessary to recompile all static executables. As far I know there are a lot of routers, embedded systems etc., which use static linked applications. Since the bug is from the beginning of the PTR_MANGLE implementations (years 2005-2006) there are a ton of vulnerable devices. (CVE-2013-4788)

Alerts:
Fedora FEDORA-2013-17475 2013-09-28
openSUSE openSUSE-SU-2013:1510-1 2013-09-30

(Log in to post comments)

glibc: multiple vulnerabilities

Posted Oct 3, 2013 13:45 UTC (Thu) by nix (subscriber, #2304) [Link]

Note that the bugs in the first paragraph (integer overflows in obscure allocation functions) are *not* the same as the bug in the second and below (a failure to initialize pointer mangling in statically linked binaries).

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds