Archive for the ‘how to hack linux’ Category

RunC Flaw Lets Attackers Escape Linux Containers to Gain Root on Hosts

February 12th, 2019
A serious security vulnerability has been discovered in the core runC container code that affects several open-source container management systems, potentially allowing attackers to escape Linux container and obtain unauthorized, root-level access to the host operating system. The vulnerability, identified as CVE-2019-5736, was discovered by open source security researchers Adam Iwaniuk and

Posted in Amazon AWS, Cloud hosting, docker, Google Cloud, hacking news, how to hack linux, Kubernetes, linux, linux container, Linux hacking, redhat linux, SELinux, Suse Linux, Virtualization software | Comments (0)

7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely

May 25th, 2017

A 7-year-old critical remote code execution vulnerability has been discovered in Samba networking software that could allow a remote attacker to take control of an affected Linux and Unix machines.

Samba is open-source software (re-implementation of SMB networking protocol) that runs on the majority of operating systems available today, including Windows, Linux, UNIX, IBM System 390, and

Posted in exploit code, hacking Linux servers, hacking news, how to hack linux, linux security, Metasploit Framework, remote code execution, Samba server, Samba Service, Samba vulnerability, smb vulnerability | Comments (0)

Linux Kernel Gets Patch For Years-Old Serious Vulnerability

March 16th, 2017

Another dangerous vulnerability has been discovered in Linux kernel that dates back to 2009 and affects a large number of Linux distros, including Red Hat, Debian, Fedora, OpenSUSE, and Ubuntu.

The latest Linux kernel flaw (CVE-2017-2636), which existed in the Linux kernel for the past seven years, allows a local unprivileged user to gain root privileges on affected systems or cause a denial

Posted in Buffer Overflow, double free vulnerability, how to hack linux, Linux hacking, Linux kernel, Linux kernel exploit, Linux Vulnerability, memory corruption vulnerability, Vulnerability | Comments (0)

5-Year-Old Linux Kernel Local Privilege Escalation Flaw Discovered

December 7th, 2016

A 5-year-old serious privilege-escalation vulnerability has been discovered in Linux kernel that affects almost every distro of the Linux operating system, including Redhat, and Ubuntu.

Over a month back, a nine-year-old privilege-escalation vulnerability, dubbed “Dirty COW,” was discovered in the Linux kernel that affected every distro of the open-source operating system, including Red Hat,

Posted in Denial of Service, hacking news, how to hack linux, Linux hacking, Linux kernel, Linux kernel exploit, linux security, Linux Vulnerability, server hacking, Vulnerability | Comments (0)