Linux battery utility TLP patched after authentication bypass flaw

A critical vulnerability in the TLP Linux power management tool has been fixed after researchers discovered it allowed local attackers to bypass authentication and alter system settings. The flaw, identified in version 1.9.0 and tracked as CVE-2025-67859, stemmed from a race condition in the Polkit mechanism. TLP developers released version 1.9.1 on January 7, 2026, addressing the issue following coordinated disclosure.

Security researchers from SUSE and openSUSE uncovered a severe authentication bypass in TLP version 1.9.0, a popular utility for optimizing laptop battery life on Linux systems. Tracked as CVE-2025-67859, the vulnerability exploited Polkit's deprecated "unix-process" subject, which relies on process IDs for authorization. This method, known to be susceptible to race conditions since CVE-2013-4288, allowed local unprivileged users to substitute their processes during authentication checks, gaining control over power profiles and daemon logging without administrative credentials.

The issue arose with the introduction of a new power daemon in TLP 1.9.0, featuring a D-Bus API for system settings. Researchers Matthias Gerstner and Filippo Bonazzi identified that attackers could exploit this to arbitrarily modify configurations in multi-user environments, posing risks of system tampering.

Additional flaws included predictable cookie values enabling unauthorized release of profile holds, unhandled exceptions from malformed requests, and unlimited profile holds that could lead to denial-of-service attacks. These collectively widened the attack surface.

On December 16, 2025, the researchers notified TLP's upstream developer, who responded promptly and provided patches within four days. After review, TLP 1.9.1 was released on January 7, 2026, implementing key fixes: switching to Polkit's secure "system bus name" subject, using cryptographically random cookie values, limiting concurrent profile holds to 16, and enhancing input validation.

Linux users and administrators are urged to update to version 1.9.1 or later via their distribution's package manager. This incident highlights the need for robust security in utilities handling privileged D-Bus operations, with the swift collaborative response exemplifying effective vulnerability management.

ተያያዥ ጽሁፎች

Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
በ AI የተሰራ ምስል

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

በAI የተዘገበ በ AI የተሰራ ምስል

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

The GNU C Library has addressed a long-standing security vulnerability that dates back to 1996. This fix, identified as CVE-2026-0915, patches a flaw present in the library since its early versions. The update aims to enhance security for systems relying on this fundamental component of Linux distributions.

በAI የተዘገበ

Building on initial reports of the proposed runtime standby ABI for Linux—inspired by Windows' Modern Standby—a detailed eight-patch series has been posted to the kernel mailing list by Antheas Kapenekakis. Targeting x86 ACPI systems, it enables low-power 'asleep' appearances while keeping essential services active, promising better battery life for laptops, handhelds, and more.

Linux systems face significant risks from unpatched vulnerabilities, challenging the notion of their inherent security. Experts emphasize the need for automated patch management to protect open-source enterprises effectively.

በAI የተዘገበ

The privacy-focused Linux distribution Tails has released version 7.4, introducing the ability to save language, keyboard layout, and format preferences persistently on USB sticks. This update also brings upgrades to Tor Browser and Thunderbird, along with several bug fixes. The release occurred on January 15, 2026, as the fourth minor update in the 7.x series.

Developers of the anonymizing Linux distribution Tails have released version 7.3.1, skipping 7.3 to address a security vulnerability. This update brings the latest versions of Tor Browser, Tor client, and Thunderbird. The release emphasizes protection against surveillance through updated core software.

በAI የተዘገበ

Developers have prepared a Linux driver for ThinkPad laptops to detect and report hardware damage. The feature begins with identifying issues in USB-C ports. This update aims to enhance hardware diagnostics on Linux systems.

 

 

 

ይህ ድረ-ገጽ ኩኪዎችን ይጠቀማል

የእኛን ጣቢያ ለማሻሻል ለትንታኔ ኩኪዎችን እንጠቀማለን። የእኛን የሚስጥር ፖሊሲ አንብቡ የሚስጥር ፖሊሲ ለተጨማሪ መረጃ።
ውድቅ አድርግ