All Questions
Tagged with kernelprivilege-escalation
6 questions
1vote
0answers
162views
Was Unpriviledged User Namespaces exploited since it started to default to YES?
We had good discussions about it being safe or not five years ago, and it was defaulted to yes on the kernel way over 3 years ago (with a note calling anyone security conscious who disable it as ...
0votes
0answers
258views
Why does Ubuntu deem 16.04 un-affected by CVE-2017-16995(Kernel Privilege Escalation) while it's not?
In both current OVAL definition and CVE Tracker, it says for Ubuntu 16.04 While related to the CVE in some way, the 'linux' package in xenial is not affected. But I have tested many kernel ...
4votes
1answer
3kviews
How detrimental is a NULL pointer dereference vulnerability today?
Recently I have been reading about the implications of NULL pointer dereferences in kernel code (often LKMs/modules), specifically escalating privileges to root via mmap()ing the NULL page and then ...
28votes
2answers
4kviews
Methods root can use to elevate itself to kernel mode
When most Linux users hear "root", they think of the maximum possible privilege on a computer. Some even think that root runs in ring 0. But in reality, root is just a regular user running in ring 3, ...
10votes
1answer
5kviews
What is real-world impact of CVE-2016-0728 (Linux Kernel Vulnerability)
Today emerged report about another serious vulnerability in opensource world, CVE-2016-0728. It is local privilege escalation in Linux kernel 3.8+. What are the the possible real-world exploitation, ...
3votes
1answer
683views
Is the 'SUIDGuard' patch safe to implement?
Can someone who really knows what they're looking at advise whether the patch published here by Stefan Esser is in fact safe to install? While I'm very concerned that Apple haven't published an ...