• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
looney tunables: new linux flaw enables privilege escalation on major

Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions

You are here: Home / General Cyber Security News / Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions
October 4, 2023

A new Linux security vulnerability dubbed Looney Tunables has been found in the GNU C library’s ld.so dynamic loader that, if successfully exploited, could direct to a community privilege escalation and allow a risk actor to gain root privileges.

Tracked as CVE-2023-4911 (CVSS score: 7.8), the issue is a buffer overflow that resides in the dynamic loader’s processing of the GLIBC_TUNABLES atmosphere variable. Cybersecurity company Qualys, which disclosed aspects of the bug, explained it was released as a code dedicate made in April 2021.

The GNU C library, also called glibc, is a core library in Linux-based mostly systems that offers foundational features this sort of as open up, browse, compose, malloc, printf, getaddrinfo, dlopen, pthread_make, crypt, login, and exit.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

glibc’s dynamic loader is a crucial component that is dependable for making ready and running packages, like locating the essentially shared object dependencies demanded as nicely as loading them into memory and linking them at runtime.

The vulnerability impacts important Linux distributions like Fedora 37 and 38, Ubuntu 22.04 and 23.04, and Debian 12 and 13, despite the fact that other distributions are likely to be vulnerable and exploitable. 1 noteworthy exception is Alpine Linux, which works by using the musl libc library in its place of glibc.

“The existence of a buffer overflow vulnerability in the dynamic loader’s dealing with of the GLIBC_TUNABLES environment variable poses considerable challenges to several Linux distributions,” Saeed Abbasi, merchandise supervisor at Qualys Menace Study Unit, reported.

“This atmosphere variable, meant to wonderful-tune and optimize apps linked with glibc, is an vital software for developers and method directors. Its misuse or exploitation broadly affects procedure functionality, trustworthiness, and security.”

An advisory issued by Pink Hat states that a neighborhood attacker could exploit the shortcoming to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID authorization to execute code with elevated privileges.

Cybersecurity

It has also presented non permanent mitigation that, when enabled, terminates any setuid program invoked with GLIBC_TUNABLES in the ecosystem.

Looney Tunables is the most recent addition to a escalating list of privilege escalation flaws that have been uncovered in Linux in new several years, counting CVE-2021-3156 (Baron Samedit), CVE-2021-3560, CVE-2021-33909 (Sequoia), and CVE-2021-4034 (PwnKit), that could be weaponized to get hold of elevated permissions.

Located this write-up attention-grabbing? Comply with us on Twitter  and LinkedIn to go through much more unique material we write-up.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «qualcomm releases patch for 3 new zero days under active exploitation Qualcomm Releases Patch for 3 new Zero-Days Under Active Exploitation
Next Post: Microsoft Warns of Cyber Attacks Attempting to Breach Cloud via SQL Server Instance microsoft warns of cyber attacks attempting to breach cloud via»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.