home.social

#privilege-escalation — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #privilege-escalation, aggregated by home.social.

fetched live
  1. #Fragnesia Made Public As Latest #Linux Local #PrivilegeEscalation #Vulnerability

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the #kernel page cache of read-only files through a separate ESP/XFRM logic bug.
    #dirtyfrag #security

    linux.slashdot.org/story/26/05

  2. 🚨 Oh no, not another "all versions" #bug in FreeBSD! 🎉 Apparently, executing a program in your own system is now a privilege escalation 🧙‍♂️✨ Bravo to FreeBSD's stellar security team for fixing a problem that they didn't know existed until Ryan from Calif.io came along to enlighten them. 🙃🔒
    freebsd.org/security/advisorie #FreeBSD #PrivilegeEscalation #SecurityFix #HackerNews #Califio #HackerNews #ngated

  3. And here's another one:
    github.com/0xdeadbeefnetwork/C

    This one is not fixed by f4c50a40, so all current kernels are vulnerable. Looks like mitigation is possible by blocking kernel modules `esp4` + `esp6` here as well (and breaking #IPSec in doing so). Can someone confirm?

    Why is it called "Electric Boogaloo"… is this a #DonaldByrd fan? Were they inspired by this week's @thekalimerashow shows??

    #privilegeescalation #linux #vulnerability #linuxadmin #sysadmin #exploit #copyfail2 #electricboogaloo

  4. Here we go again :-/ Another deterministic #privilegeescalation bug in the #Linux kernel. Make sure you're using at least the following version of your branch to mitigate against #dirtyfrag:

    - 7.0.5
    - 6.18.28
    - 6.12.87
    - 6.6.138
    - 6.1.171
    - 5.15.205
    - 5.10.255

    6.19 is eol, so it probably won't get patched. Remove and blocklist the following modules if you have to use an unpatched kernel: esp4 esp6 rxrpc

    See github.com/V4bel/dirtyfrag/blo for more info.

    #vulnerability #linuxadmin #sysadmin #exploit

  5. Copy fail : depuis 2017, une faille dans le noyau Linux permettait à un utilisateur de passer root.

    30 avril 2026 - Martin Clavey

    Depuis 2017, une vulnérabilité dans le module cryptographique authencesn du noyau Linux laissait à un compte d’un simple utilisateur la possibilité de passer en root. Elle concerne la plupart des grandes distributions jusqu’au déploiement du patch, qui est déjà en cours.

    1/

    next.ink/236230/copy-fail-depu

    #Linux #CopyFail #Xint #Root #authencesn #SuperUser #Docker #Kubernetes #Vulnerability #Debian #Python #Patch #Cybersecurity #InfoSec #Data_Breach #PrivilegeEscalation #Privilege #Kernel #AEAD #AuthenticatedEncryption

  6. Linux Privilege Escalation Cheat Sheet: Techniques and Prevention.

    In this cheat sheet, I break down essential enumeration commands, common escalation paths, and practical techniques every security professional should know.
    denizhalil.com/2025/06/30/linu

    #CyberSecurity #LinuxSecurity #PrivilegeEscalation #Pentesting #RedTeam #BlueTeam #InfoSec #ethicalhacking #SecurityEngineering #itsecurity

  7. I couldn't find a list of #Linux #kernel versions that include a patch for #copyfail, so I dug into the commit log and made one. Make sure you're using at least the following version of your branch to mitigate against copyfail:

    - 7.0-rc7 (any stable 7.x is safe)
    - 6.19.12
    - 6.18.22
    - 6.12.85
    - 6.6.137
    - 6.1.170
    - 5.15.204
    - 5.10.254

    See copy.fail for more info about the #exploit.

    #privilegeescalation #vulnerability #cryptography #linuxadmin #sysadmin

  8. @TilliAtHome Habe gelesen, daß es für Desktops mit IntelCPU nur 5% Leistungsgewinn bringt,?! Also hab ich mich nicht weiter damit beschäftigt 🤔 teste ich mal an einem offline Rechner 👍 Die Einschätzung des Risikos durch z.B. #spectre oder #meltdown und mögliche #Angriffsvektoren habe ich anderen überlassen, jetzt stellt sich mir auch noch mal die Frage, wie groß ist das Risiko für welche Nutzungsszenarien?

    #itsec #malware #ransomware #phishing #privilegeescalation #linux #foreshadow #zombieload

  9. 🔥 Open-source project: Automated audit & hardening of Linux cron jobs (LPE detection & scripts)

    After several months of research and lab testing, I’m releasing a complete guide + scripts to detect and fix privilege escalation via misconfigured cron jobs on Linux (automated audit, exploitation examples, hardening tips, etc.).

    💡 Example: root shell on a cloud VM through a simple cron misconfiguration (see screenshot).

    For sysadmins, SecOps, pentesters, or anyone passionate about Linux security.

    👉 GitHub repo: github.com/privlabs/lpe-cron-m

    Feel free to test, comment, or contribute! Would love your feedback or stories of similar issues you’ve found.

    #linux #infosec #sysadmin #opensource #cybersecurity #privilegeescalation