Linux battery utility TLP patched after authentication bypass flaw

A critical vulnerability in the TLP Linux power management tool has been fixed after researchers discovered it allowed local attackers to bypass authentication and alter system settings. The flaw, identified in version 1.9.0 and tracked as CVE-2025-67859, stemmed from a race condition in the Polkit mechanism. TLP developers released version 1.9.1 on January 7, 2026, addressing the issue following coordinated disclosure.

Security researchers from SUSE and openSUSE uncovered a severe authentication bypass in TLP version 1.9.0, a popular utility for optimizing laptop battery life on Linux systems. Tracked as CVE-2025-67859, the vulnerability exploited Polkit's deprecated "unix-process" subject, which relies on process IDs for authorization. This method, known to be susceptible to race conditions since CVE-2013-4288, allowed local unprivileged users to substitute their processes during authentication checks, gaining control over power profiles and daemon logging without administrative credentials.

The issue arose with the introduction of a new power daemon in TLP 1.9.0, featuring a D-Bus API for system settings. Researchers Matthias Gerstner and Filippo Bonazzi identified that attackers could exploit this to arbitrarily modify configurations in multi-user environments, posing risks of system tampering.

Additional flaws included predictable cookie values enabling unauthorized release of profile holds, unhandled exceptions from malformed requests, and unlimited profile holds that could lead to denial-of-service attacks. These collectively widened the attack surface.

On December 16, 2025, the researchers notified TLP's upstream developer, who responded promptly and provided patches within four days. After review, TLP 1.9.1 was released on January 7, 2026, implementing key fixes: switching to Polkit's secure "system bus name" subject, using cryptographically random cookie values, limiting concurrent profile holds to 16, and enhancing input validation.

Linux users and administrators are urged to update to version 1.9.1 or later via their distribution's package manager. This incident highlights the need for robust security in utilities handling privileged D-Bus operations, with the swift collaborative response exemplifying effective vulnerability management.

Makala yanayohusiana

Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
Picha iliyoundwa na AI

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

Imeripotiwa na AI Picha iliyoundwa na AI

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

A security vulnerability in Dell software has reportedly remained unpatched for almost two years, allowing Chinese hackers to exploit it. The flaw involves hardcoded login credentials in a tool, raising concerns about data security.

Imeripotiwa na AI

The GNU C Library has addressed a long-standing security vulnerability that dates back to 1996. This fix, identified as CVE-2026-0915, patches a flaw present in the library since its early versions. The update aims to enhance security for systems relying on this fundamental component of Linux distributions.

A recent article highlights growing frustrations with d-bus, the longstanding interprocess communication system in Linux, proposing hyprwire as a superior alternative. Critics point to security flaws and poor documentation after nearly two decades of use. The discussion underscores the need for modernization in Linux's core infrastructure.

Imeripotiwa na AI

The Linux kernel version 6.19 introduces enhancements to the turbostat tool. It now includes new cache statistics and support for upcoming Intel processors. These updates aim to improve monitoring of CPU performance.

The anonymizing Linux distribution Tails has launched version 7.5, moving the Thunderbird email client to an external package for enhanced security. This change addresses frequent updates that left the software vulnerable in prior releases. Other components, including the Tor Browser and Tor client, have also been updated.

Imeripotiwa na AI

NVIDIA has released an urgent security update to address a high-severity vulnerability in its NSIGHT Graphics tool for Linux systems. The flaw, identified as CVE-2025-33206, could enable attackers to execute arbitrary code if exploited. Affected users are urged to upgrade immediately to mitigate risks.

Alhamisi, 19. Mwezi wa pili 2026, 04:55:47

Linux 7.0 updates Turbostat to include L2 cache statistics

Jumatano, 4. Mwezi wa pili 2026, 19:25:39

Russian hackers exploit Microsoft Office vulnerability days after patch

Jumanne, 27. Mwezi wa kwanza 2026, 11:30:57

Updated linux patches manage out-of-memory behavior via bpf

Alhamisi, 15. Mwezi wa kwanza 2026, 23:14:14

Tails 7.4 released with persistent language and format settings

Jumanne, 13. Mwezi wa kwanza 2026, 02:33:13

Linux Plumbers Conference explores TAB's role in kernel future

Ijumaa, 9. Mwezi wa kwanza 2026, 06:48:48

Linux kernel bugs can hide for up to 20 years

Alhamisi, 8. Mwezi wa kwanza 2026, 08:48:32

The myth of Linux's invincibility in enterprise security

Jumamosi, 27. Mwezi wa kumi na mbili 2025, 14:05:32

Linux 6.19 kernel fixes scheduler regression for performance gains

Jumamosi, 27. Mwezi wa kumi na mbili 2025, 01:48:55

Linux runtime standby ABI: Eight-patch series details and community buzz

Jumanne, 16. Mwezi wa kumi na mbili 2025, 23:12:04

React2Shell exploits continue with large-scale Linux backdoor deployments and cloud credential theft

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa