CVE-2024-34455

7.5 HIGH

📋 TL;DR

This vulnerability in Buildroot allows attackers to manipulate the /dev/shm directory due to missing sticky bit permissions. It affects systems using Buildroot before version 2024.02.2. The lack of sticky bit enables unauthorized file operations in shared memory.

💻 Affected Systems

Products:
  • Buildroot
Versions: All versions before 2024.02.2
Operating Systems: Linux-based systems using Buildroot
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Buildroot-built systems where /dev/shm is used for shared memory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privilege escalation leading to root access, data manipulation, or system compromise through shared memory exploitation.

🟠

Likely Case

Unauthorized file creation or deletion in /dev/shm, potentially disrupting applications using shared memory.

🟢

If Mitigated

Minimal impact with proper directory permissions and isolation controls in place.

🌐 Internet-Facing: LOW - Requires local access or existing system compromise to exploit.
🏢 Internal Only: MEDIUM - Internal attackers with shell access could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local shell access and knowledge of shared memory usage patterns.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.02.2

Vendor Advisory: https://github.com/buildroot/buildroot/commit/0b2967e15800421efbdfe3a7a6061cf6bd84134d

Restart Required: No

Instructions:

1. Update Buildroot to version 2024.02.2 or later. 2. Rebuild your system image. 3. Deploy the updated image to affected systems.

🔧 Temporary Workarounds

Manual sticky bit application

linux

Manually set the sticky bit on /dev/shm directory

chmod +t /dev/shm

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access /dev/shm
  • Monitor file operations in /dev/shm directory for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check /dev/shm permissions: ls -ld /dev/shm | grep '^drwxrwxrwt' - if missing 't' in permissions, vulnerable.

Check Version:

Check Buildroot version in build configuration or run: grep 'BR2_VERSION' in buildroot directory.

Verify Fix Applied:

Verify /dev/shm has sticky bit: ls -ld /dev/shm should show 'drwxrwxrwt'.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation/deletion in /dev/shm
  • Permission change attempts on /dev/shm

Network Indicators:

  • None - local-only vulnerability

SIEM Query:

process.name:chmod AND file.path:/dev/shm OR file.path:/dev/shm/*

🔗 References

📤 Share & Export