• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
looney tunables: new linux flaw enables privilege escalation on major

Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions

You are here: Home / General Cyber Security News / Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions
October 4, 2023

A new Linux security vulnerability dubbed Looney Tunables has been found in the GNU C library’s ld.so dynamic loader that, if successfully exploited, could direct to a community privilege escalation and allow a risk actor to gain root privileges.

Tracked as CVE-2023-4911 (CVSS score: 7.8), the issue is a buffer overflow that resides in the dynamic loader’s processing of the GLIBC_TUNABLES atmosphere variable. Cybersecurity company Qualys, which disclosed aspects of the bug, explained it was released as a code dedicate made in April 2021.

The GNU C library, also called glibc, is a core library in Linux-based mostly systems that offers foundational features this sort of as open up, browse, compose, malloc, printf, getaddrinfo, dlopen, pthread_make, crypt, login, and exit.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

glibc’s dynamic loader is a crucial component that is dependable for making ready and running packages, like locating the essentially shared object dependencies demanded as nicely as loading them into memory and linking them at runtime.

The vulnerability impacts important Linux distributions like Fedora 37 and 38, Ubuntu 22.04 and 23.04, and Debian 12 and 13, despite the fact that other distributions are likely to be vulnerable and exploitable. 1 noteworthy exception is Alpine Linux, which works by using the musl libc library in its place of glibc.

“The existence of a buffer overflow vulnerability in the dynamic loader’s dealing with of the GLIBC_TUNABLES environment variable poses considerable challenges to several Linux distributions,” Saeed Abbasi, merchandise supervisor at Qualys Menace Study Unit, reported.

“This atmosphere variable, meant to wonderful-tune and optimize apps linked with glibc, is an vital software for developers and method directors. Its misuse or exploitation broadly affects procedure functionality, trustworthiness, and security.”

An advisory issued by Pink Hat states that a neighborhood attacker could exploit the shortcoming to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID authorization to execute code with elevated privileges.

Cybersecurity

It has also presented non permanent mitigation that, when enabled, terminates any setuid program invoked with GLIBC_TUNABLES in the ecosystem.

Looney Tunables is the most recent addition to a escalating list of privilege escalation flaws that have been uncovered in Linux in new several years, counting CVE-2021-3156 (Baron Samedit), CVE-2021-3560, CVE-2021-33909 (Sequoia), and CVE-2021-4034 (PwnKit), that could be weaponized to get hold of elevated permissions.

Located this write-up attention-grabbing? Comply with us on Twitter  and LinkedIn to go through much more unique material we write-up.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «qualcomm releases patch for 3 new zero days under active exploitation Qualcomm Releases Patch for 3 new Zero-Days Under Active Exploitation
Next Post: Microsoft Warns of Cyber Attacks Attempting to Breach Cloud via SQL Server Instance microsoft warns of cyber attacks attempting to breach cloud via»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.