Linux kernel flaw lets unprivileged users gain root access

Qualys researchers have identified a logic flaw in the Linux kernel that enables unprivileged local users to disclose sensitive files and execute arbitrary commands as root.

The vulnerability affects default installations of several major Linux distributions. Qualys's Threat Research Unit discovered the issue and detailed it in a blog post published on Friday.

Relaterede artikler

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Billede genereret af AI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Rapporteret af AI Billede genereret af AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

A security researcher has disclosed Dirty Frag, a new Linux kernel exploit that allows local users to gain root privileges. The flaw affects major distributions and remains unpatched on most systems despite earlier fixes for a similar issue.

Rapporteret af AI

A new Linux local privilege escalation vulnerability known as Fragnesia has been made public. The flaw is described as similar to Dirty Frag and involves an ESP/XFRM logic bug.

A newly published zero-day exploit allows attackers with physical access to bypass BitLocker encryption on Windows 11 devices in seconds. The attack, named YellowKey, targets the default TPM-only configuration and grants full access to encrypted drives via a simple USB-based method.

Rapporteret af AI

Greg Kroah-Hartman, maintainer of the Linux kernel, stated that AI-driven code review tools have become genuinely useful. He told The Register that the technology reached an inflection point about a month ago, leading to actionable bug reports.

Dette websted bruger cookies

Vi bruger cookies til analyse for at forbedre vores side. Læs vores privatlivspolitik for mere information.
Afvis