Hi,
Apologies for exposing my ignorance in public like this, but can somebody tell me how
I'd know if my Debian Bookworm system has been patched to ensure it's no longer
vulnerable to the "Looney Tunables" privilege escalation
(
https://www.debian.org/security/2023/dsa-5514)?
The fix is apparently in the most recent glibc source package. I don't seem to have
that glibc package installed (and it's a source package, not a binary?), but I read
that stock installs of Debian (and most linuxes) are vulnerable. Which actual binary
packages need to be updated to fix the vulnerability in the dynamic loader, and how does
this relate to the source package?
Cheers,
jmi
--
Jamie MacIsaac
jamie(a)macisa.ac