this post was submitted on 29 Apr 2026
221 points (100.0% liked)

Linux

64958 readers
514 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 7 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] eager_eagle@lemmy.world 36 points 1 day ago* (last edited 1 day ago) (2 children)

wtf

An unprivileged local user can write 4 controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root.

If your kernel was built between 2017 and the patch — which covers essentially every mainstream Linux distribution — you're in scope.

how does that only get a CVE score of 7.8, the impact of this is huge

[–] Bitflip@lemmy.ml 69 points 1 day ago (2 children)

Probably because the attack vector is having a user account on the target

[–] nyan@sh.itjust.works 26 points 1 day ago (2 children)

Exactly. It's Yet Another Privilege Escalation Vulnerability. Unless you're dealing with a multiuser machine, the attacker first needs to use some other vuln to get into an unprivileged account. Without that additional vulnerability, this exploit is useless.

[–] solrize@lemmy.ml 18 points 1 day ago (1 children)

some other vuln

You mean like inveigling it into a pypi or npm or whatever package? Checks out.

[–] Aatube@piefed.social 12 points 1 day ago

That's privilege escalation for you. 7.8 is pretty high.

[–] tomalley8342@lemmy.world 4 points 1 day ago* (last edited 1 day ago) (2 children)

Yet another? Are there really so many LPEVs in linux?

[–] olosta@lemmy.world 5 points 16 hours ago

I manage multi user systems and try to be on top of this and no, privilege escalation with a working public exploit are very rare. There's quite a lot of CVEs with potential privilege excalation, but most of the time there is no real world exploit. And a large part of those are related to user namespaces in one way or another.

This one is truly scary, at least the immediate mitigation is pretty straightforward.

[–] nyan@sh.itjust.works 6 points 1 day ago

Well, it often feels like every "Linux security issue" flagged in the tech press is a privilege escalation, but I admit that I haven't sat down and done the math.

[–] Technus@lemmy.zip 12 points 1 day ago (1 children)

"The exploit is coming from inside the house!"

[–] sakuraba@lemmy.ml 6 points 1 day ago* (last edited 1 day ago)

hey these exploits keep the lights on for some tech youtubers, stop making fun of it!! it is very dangerous!!!

(video titled: LINUX HAS BEEN HACKED, AGAIN?!)

[–] KairuByte@lemmy.dbzer0.com 22 points 1 day ago

It’s not an interaction-less RCE, for one.