Simple privilege escalation exploit lands for Linux kernels

Simple privilege escalation exploit lands for Linux kernels

HomeNews, Other ContentSimple privilege escalation exploit lands for Linux kernels

A proof-of-concept Linux privilege exploit has been published that, according to the bug hunter who developed it, usually works without effort on kernel versions between at least 5.14 and 6.6.14.

Linux Privilege Escalation – Enumeration [HINDI] | Part_01 | PentestHint

Running the exploit as a normal user on a vulnerable machine will give you root access to the box, allowing you to do whatever you want on it. This can be used by rogue insiders or malware already on a computer to cause further damage and problems.

This affects Debian, Ubuntu, Red Hat, Fedora and no doubt other Linux distributions. The debugger, known by the handle Notselwyn, issued a very detailed technical report on the bug this week, saying their exploit had a 99.4 percent success rate on the 6.4.16 kernel, for example.

The vulnerability is tracked as CVE-2024-1086. It is rated 7.8 out of 10 in terms of CVSS severity. It was patched in late January, updates have been rolling out since then, and if you haven't yet upgraded your vulnerable kernel and local privilege escalation (LPE) is a concern, take a closer look at this thing.

Tagged:
Simple privilege escalation exploit lands for Linux kernels.
Want to go more in-depth? Ask a question to learn more about the event.