#kernel-mode-privileges

[ follow ]
Information security
fromSecurityWeek
1 day ago

Easily Exploitable 'Pack2TheRoot' Linux Vulnerability Leads to Root Access

A high-severity vulnerability in PackageKit allows unprivileged users to install packages with root privileges, tracked as CVE-2026-41651.
fromYcombinator
2 weeks ago
Information security

Show HN: OpenParallax: OS-level privilege separation for AI agent execution | Hacker News

An open-source AI agent was developed with a secure, sandboxed architecture to prevent data exfiltration and unauthorized actions.
Information security
fromInfoQ
1 week ago

Claude Code Used to Find Remotely Exploitable Linux Kernel Vulnerability Hidden for 23 Years

Claude Code identified multiple security vulnerabilities in the Linux kernel, including a long-standing heap buffer overflow, with minimal oversight required.
Software development
fromTheregister
1 month ago

Linux kernel czar says AI bug reports aren't slop anymore

AI-driven activity around Linux security and code review has significantly improved, leading to better quality reports and increased collaboration among open source projects.
fromThe Hacker News
1 month ago

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

This flaw (CVE-2026-3888) allows an unprivileged local attacker to escalate privileges to full root access through the interaction of two standard system components: snap-confine and systemd-tmpfiles. While the exploit requires a specific time-based window (10-30 days), the resulting impact is a complete compromise of the host system.
Information security
Software development
fromZDNET
2 months ago

Forget VirtualBox - I discovered a better, more reliable VM manager for Linux

Use Virt-Manager (KVM front-end) on Linux for virtual machines; it's free, open-source, and more reliable than VirtualBox.
Software development
fromZDNET
2 months ago

Linux explores new way of authenticating developers and their code - here's how it works

The Linux kernel is transitioning from PGP-based developer identification to a more efficient system that addresses privacy concerns and streamlines the cumbersome face-to-face key-signing verification process.
Information security
fromThe Hacker News
1 month ago

Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

Nine confused deputy vulnerabilities in Linux kernel's AppArmor module allow unprivileged users to escalate privileges to root, bypass container isolation, and execute arbitrary kernel code.
fromTheregister
2 months ago

Old Windows quirks help punch through new admin defenses

The issue focuses on how Windows handles these directories for specific user sessions. Because the kernel creates a DOS device object directory on demand, rather than at login, it cannot check whether the user is an admin during the creation process. Unlike UAC, Administrator Protection uses a hidden shadow admin account whose token handle can be returned by the system when calling the NtQueryInformationToken API function.
Information security
fromMedium
3 months ago

Linux Permissions Unleashed: A Deep Dive into Access Control Lists (ACLs)

But what happens when you need more granularity? How do you grant write access to a file to just one specific user who isn't the owner and isn't in the owning group? How do you allow two different groups read access, but only one of them write access? How do you ensure files created in a shared directory automatically get specific permissions for a certain team?
Information security
fromThe Hacker News
2 months ago

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

Windows Admin Center is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clusters without the need for connecting to the cloud. The high-severity vulnerability, tracked as CVE-2026-26119, carries a CVSS score of 8.8 out of a maximum of 10.0 "Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network," Microsoft said in an advisory released on February 17, 2026.
Information security
[ Load more ]