Joe Klemmer@lemmy.myserv.one to Linux@lemmy.ml · 1 year agoNew 'Looney Tunables' Linux bug gives root on major distroswww.bleepingcomputer.comexternal-linkmessage-square45fedilinkarrow-up1289arrow-down13file-textcross-posted to: cybersecurity@sh.itjust.works
arrow-up1286arrow-down1external-linkNew 'Looney Tunables' Linux bug gives root on major distroswww.bleepingcomputer.comJoe Klemmer@lemmy.myserv.one to Linux@lemmy.ml · 1 year agomessage-square45fedilinkfile-textcross-posted to: cybersecurity@sh.itjust.works
minus-squareVeticia@lemmy.mllinkfedilinkarrow-up36arrow-down1·1 year agoI wonder if this could be used to root previously unrootable Android based devices.
minus-squareloics2@lemm.eelinkfedilinkarrow-up60·1 year agoAndroid doesn’t use glibc, but Bionic, a C standard library developed by Google. So I don’t think this vulnerability affects Android.
minus-squareKnusper@feddit.delinkfedilinkarrow-up9·1 year agoWhat the heck. I thought, they were using musl. Certainly seems like this has rather similar goals to musl…
minus-squareAggressivelyPassive@feddit.delinkfedilinkarrow-up18arrow-down1·1 year agoThat’s no reason for Google not to reinvent the wheel… They did the same with dalvik and ART now. JVMs, but more googlier!
minus-squareStarDreamer@lemmy.blahaj.zonelinkfedilinkEnglisharrow-up1·1 year agoAnd Quic, and Pony express, and GFS…
minus-squareallywilson@sopuli.xyzlinkfedilinkEnglisharrow-up16·1 year agoThink Android uses Bionic instead of glibc (where the vulnerability is being exploited).
I wonder if this could be used to root previously unrootable Android based devices.
Android doesn’t use glibc, but Bionic, a C standard library developed by Google. So I don’t think this vulnerability affects Android.
What the heck. I thought, they were using musl.
Certainly seems like this has rather similar goals to musl…
That’s no reason for Google not to reinvent the wheel…
They did the same with dalvik and ART now. JVMs, but more googlier!
And Quic, and Pony express, and GFS…
Think Android uses Bionic instead of glibc (where the vulnerability is being exploited).