Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA warns vulnerability of aggressive exploitation of Linux kernel privileges vulnerability
Identity

CISA warns vulnerability of aggressive exploitation of Linux kernel privileges vulnerability

userBy userJune 18, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 18, 2025Ravi LakshmananLinux/Vulnerability

Linux Kernel Privilege Escalation Vulnerability

The US Cybersecurity and Infrastructure Security Agency (CISA) said Tuesday that it has been actively exploited in the wild by placing security flaws affecting Linux kernels in its known exploited vulnerabilities (KEV) catalog.

The vulnerability, CVE-2023-0386 (CVSS score: 7.8), is an inappropriate ownership bug in the Linux kernel and could be exploited to escalate the privileges of the susceptible system. The patch was applied in early 2023.

“The Linux kernel contains an inappropriate ownership management vulnerability. In this case, the OverlayFS subsystem of the Linux kernel that does not make SetUID files work, allowed users to find a way to copy a capable file from a NOSUID mount to another mount,” the agency said.

Cybersecurity

“This UID mapping bug allows local users to escalate privileges on the system.”

Currently, we don’t know how security flaws are being exploited in the wild. In a report released in May 2023, Datadog said the vulnerability is easy to exploit and works by tricking the kernel and creating and running root-owned SUID binaries in folders such as “/TMP”.

“CVE-2023-0386 lies in the fact that when the kernel copied a file from the overlay file system to the ‘upper’ directory, it did not check if the user/group that owned this file was mapped to the current username space,” the company says.

“This allows non-dedicated users to smuggle SUID binaries from the ‘bottom’ directory to the ‘top’ directory by using overlayfs as an intermediary. ”

Later that year, cloud security company Wiz detailed two security vulnerabilities called GameOver (lay) (CVE-2023-32629 and CVE-2023-2640).

“These flaws allow specialized executables to create and provide the ability to escalate the privileges of rooting affected machines at runtime,” Wiz researchers said.

The Federal Civil Enforcement Division (FCEB) agency must apply the necessary patches by July 8, 2025 to ensure its network from aggressive threats.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEven Edmonton wants a single staircase building
Next Article Amazing Pro-Fighting Swing in the Texas Legislature
user
  • Website

Related Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

July 20, 2025

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

July 20, 2025

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

July 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.