A newly discovered 12-year-old vulnerability in a Linux system tool can give attackers root privileges on machines running the operating system. Discovered and described Tuesday by researchers at ...
Unprivileged attackers can gain root privileges by exploiting a local privilege escalation (LPE) vulnerability in default configurations of the Linux Kernel's filesystem layer on vulnerable devices.
A security researcher released exploit code for a high-severity vulnerability in Linux kernel eBPF (Extended Berkeley Packet Filter) that can give an attacker increased privileges on Ubuntu machines.
Exploiting a newly discovered sudo flaw in Linux can enable certain users with to run commands as root despite restrictions against it. A newly discovered and serious flaw in the sudo command can, if ...
Microsoft has discovered vulnerabilities in system components commonly used on Linux desktops that could allow an attacker to elevate privileges to root and install malware. Gaining root privileges on ...
Several big-name Linux and BSD operating systems are vulnerable to an exploit that gives untrusted users powerful root privileges. The critical flaw in the X.org server—the open-source implementation ...
Linux users on Tuesday got a major dose of bad news—a 12-year-old vulnerability in a system tool called Polkit gives attackers unfettered root privileges on machines running most major distributions ...
OK, it looks like you need to employ some extra privilege. In general, you can’t write to a system log file with your user account. Let’s try that again with sudo. The response to the first of the ...
An error in the workings of Linux kernel versions 2.6.17 to 2.6.24.1 can give local users access to root privileges. Although example code and root exploits exist for ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results