Wednesday, May 7, 2025
HomeCyber Security NewsLooney Tunables: Linux Vulnerability Lets Attackers Gain Root Privileges

Looney Tunables: Linux Vulnerability Lets Attackers Gain Root Privileges

Published on

SIEM as a Service

Follow Us on Google News

A buffer overflow issue has been disclosed in the GNU C Library’s dynamic loader ld.so, which might allow local attackers to acquire root privileges on vulnerable Linux systems. 

The Linux vulnerability is identified as “Looney Tunables” and tagged as CVE-2023-4911. The flaw was discovered in glibc version 2.34, which was released in April 2021.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

- Advertisement - Google News

Local Privilege Escalation in the glibc’s ld.so

The GNU C Library, commonly called glibc, is the C library in the GNU system and most Linux-based kernels. 

It defines the system calls and other fundamental features that a normal program requires, such as open, malloc, printf, exit, and so on. The dynamic loader of the GNU C Library is a critical component of glibc that is responsible for program preparation and execution.

The GLIBC_TUNABLES environment variable was included in glibc to allow users to change the behavior of the library during runtime, avoiding the need to recompile either the application or the library.

Users can change different performance and behavior parameters by setting GLIBC_TUNABLES, which are then implemented when the application starts.

The Qualys researchers discovered that they could control the ld.so loader’s library search path and compel it to load a malicious shared library under the control by overwriting a specific function pointer in memory.

The ld.so loader is in charge of locating and loading shared library dependencies for executables during runtime. The vulnerability lies especially in ld.so’s handling of the GLIBC_TUNABLES environment variable, which configures glibc tuning parameters. 

Attackers can cause a buffer overflow and corrupt memory by providing a corrupted GLIBC_TUNABLES value.

Impact of Looney Tunables

Numerous Linux distributions are in danger because the dynamic loader’s handling of the GLIBC_TUNABLES environment setting has a buffer overflow vulnerability. 

For developers and system administrators, this environment variable is a crucial tool for tuning and optimizing glibc-linked applications. Its abuse or misuse has a significant impact on system security, dependability, and performance.

On default installations of Debian 12 and 13, Ubuntu 22 and 23, and Fedora 37 and 38, the vulnerability is activated while processing the GLIBC_TUNABLES environment variable.

Researchers say while some popular distributions, such as Alpine Linux, are unaffected since they utilize the musl libc rather than the glibc, many of them are possibly weak and may soon be exploited.

Patch Now!

System administrators must take immediate action given the vulnerability’s capacity to grant complete root access to well-known operating systems including Fedora, Ubuntu, and Debian.

Users of Alpine Linux may now sigh in relief, but others should prioritize patching to maintain the security and integrity of their systems.

Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the free trial to ensure 100% security.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its...

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Amazon Web Services (AWS) has addressed a critical security flaw (CVE-2025-4318) in its AWS Amplify...

Severe Kibana Flaw Allowed Attackers to Run Arbitrary Code

A newly disclosed security vulnerability in Elastic’s Kibana platform has put thousands of businesses...

IT Worker from Computacenter Let Girlfriend Into Deutsche Bank’s Restricted Areas

A former information technology manager has filed a whistleblower lawsuit alleging a major security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its...

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Amazon Web Services (AWS) has addressed a critical security flaw (CVE-2025-4318) in its AWS Amplify...

Severe Kibana Flaw Allowed Attackers to Run Arbitrary Code

A newly disclosed security vulnerability in Elastic’s Kibana platform has put thousands of businesses...