Archive for the ‘Linux kernel exploit’ Category

Google Adds Control-Flow Integrity to Beef up Android Kernel Security

October 12th, 2018
Google has added a new security feature to the latest Linux kernels for Android devices to prevent it against code reuse attacks that allow attackers to achieve arbitrary code execution by exploiting control-flow hijacking vulnerabilities. In code reuse attacks, attackers exploit memory corruption bugs (buffer overflows, type confusion, or integer overflows) to take over code pointers stored

Posted in Android, Android hacking, Android Kernel, Android Security, Buffer Overflow, Linux kernel, Linux kernel development, Linux kernel exploit, memory corruption vulnerability | Comments (0)

Linux Kernel Gets Patch For Years-Old Serious Vulnerability

March 16th, 2017

Another dangerous vulnerability has been discovered in Linux kernel that dates back to 2009 and affects a large number of Linux distros, including Red Hat, Debian, Fedora, OpenSUSE, and Ubuntu.

The latest Linux kernel flaw (CVE-2017-2636), which existed in the Linux kernel for the past seven years, allows a local unprivileged user to gain root privileges on affected systems or cause a denial

Posted in Buffer Overflow, double free vulnerability, how to hack linux, Linux hacking, Linux kernel, Linux kernel exploit, Linux Vulnerability, memory corruption vulnerability, Vulnerability | Comments (0)

11-Year Old Linux Kernel Local Privilege Escalation Flaw Discovered

February 22nd, 2017

Another privilege-escalation vulnerability has been discovered in Linux kernel that dates back to 2005 and affects major distro of the Linux operating system, including Redhat, Debian, OpenSUSE, and Ubuntu.

Over a decade old Linux Kernel bug (CVE-2017-6074) has been discovered by security researcher Andrey Konovalov in the DCCP (Datagram Congestion Control Protocol) implementation using

Posted in DCCP protocol, hacking news, Linux kernel, Linux kernel development, Linux kernel exploit, local root exploit, privilege escalation, Vulnerability | Comments (0)

5-Year-Old Linux Kernel Local Privilege Escalation Flaw Discovered

December 7th, 2016

A 5-year-old serious privilege-escalation vulnerability has been discovered in Linux kernel that affects almost every distro of the Linux operating system, including Redhat, and Ubuntu.

Over a month back, a nine-year-old privilege-escalation vulnerability, dubbed “Dirty COW,” was discovered in the Linux kernel that affected every distro of the open-source operating system, including Red Hat,

Posted in Denial of Service, hacking news, how to hack linux, Linux hacking, Linux kernel, Linux kernel exploit, linux security, Linux Vulnerability, server hacking, Vulnerability | Comments (0)

Kernel Backdoor found in Gadgets Powered by Popular Chinese ARM Maker

May 12th, 2016

How to Hack an Android device?

It is possibly one of the most frequently asked questions on the Internet.

Although it’s not pretty simple to hack Android devices and gadgets, sometimes you just get lucky to find a backdoor access.

Thanks to Allwinner, a Chinese ARM system-on-a-chip maker, which has recently been caught shipping a version of Linux Kernel with an incredibly simple and

Posted in Android Security, hacking android phone, how to hack android, How to hack computer, kernel hacker, Linux kernel, Linux kernel exploit, root android phone, root exploit | Comments (0)

How to Run Linux Kernel on Canon DSLRs Cameras

April 7th, 2015

Last month, I Got a Canon’s amazing and powerful video-capable DSLR Camera and was wondering if I could play a hack on it.

Yes, Just like last time I installed and run Linux on my PlayStation 3 gaming console and the popular game console, the Nintendo Wii.
What If I could port Linux Kernel to my DSLR Camera ??
Well, it’s now possible for you to port Linux to your Canon DSLR cameras, thanks to

Posted in Canon DRLR Camera, hacking linux, How to hack DSLR camera, Linux kernel development, Linux kernel exploit, Port Linux | Comments (0)