246
submitted 3 days ago by rabber@lemmy.ca to c/linux@lemmy.ml
you are viewing a single comment's thread
view the rest of the comments
[-] eager_eagle@lemmy.world 40 points 3 days ago* (last edited 3 days ago)

wtf

An unprivileged local user can write 4 controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root.

If your kernel was built between 2017 and the patch — which covers essentially every mainstream Linux distribution — you're in scope.

how does that only get a CVE score of 7.8, the impact of this is huge

[-] Bitflip@lemmy.ml 78 points 3 days ago

Probably because the attack vector is having a user account on the target

[-] nyan@sh.itjust.works 32 points 3 days ago

Exactly. It's Yet Another Privilege Escalation Vulnerability. Unless you're dealing with a multiuser machine, the attacker first needs to use some other vuln to get into an unprivileged account. Without that additional vulnerability, this exploit is useless.

[-] solrize@lemmy.ml 20 points 3 days ago

some other vuln

You mean like inveigling it into a pypi or npm or whatever package? Checks out.

[-] Aatube@piefed.social 15 points 3 days ago

That's privilege escalation for you. 7.8 is pretty high.

[-] tomalley8342@lemmy.world 5 points 3 days ago* (last edited 3 days ago)

Yet another? Are there really so many LPEVs in linux?

[-] olosta@lemmy.world 9 points 2 days ago

I manage multi user systems and try to be on top of this and no, privilege escalation with a working public exploit are very rare. There's quite a lot of CVEs with potential privilege excalation, but most of the time there is no real world exploit. And a large part of those are related to user namespaces in one way or another.

This one is truly scary, at least the immediate mitigation is pretty straightforward.

[-] nyan@sh.itjust.works 6 points 3 days ago

Well, it often feels like every "Linux security issue" flagged in the tech press is a privilege escalation, but I admit that I haven't sat down and done the math.

[-] Technus@lemmy.zip 12 points 3 days ago

"The exploit is coming from inside the house!"

[-] sakuraba@lemmy.ml 6 points 3 days ago* (last edited 3 days ago)

hey these exploits keep the lights on for some tech youtubers, stop making fun of it!! it is very dangerous!!!

(video titled: LINUX HAS BEEN HACKED, AGAIN?!)

[-] KairuByte@lemmy.dbzer0.com 22 points 3 days ago

It’s not an interaction-less RCE, for one.

this post was submitted on 29 Apr 2026
246 points (99.6% liked)

Linux

65019 readers
490 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 7 years ago
MODERATORS