Easily exploitable Linux bug gives root access to attackers (CVE-2022-0847)

An easily exploitable vulnerability (CVE-2022-0847) in the Linux kernel can be used by local unprivileged users to gain root privileges on vulnerable systems by taking advantage of already public exploits. Discovered by security researcher Max Kellerma… Continue reading Easily exploitable Linux bug gives root access to attackers (CVE-2022-0847)

PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)

A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by local unprivileged users to gain full root privileges. While the vulnerability i… Continue reading PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)

Is it really safe to pass sensitive data to another script via stdin, compared to passing via arguments (Linux)

Yes, the transfer to the script via arguments is visible through ps -ax, /proc/<pid>/cmdline etc., BUT if someone has already gained access to your account from the outside (e.g. by hacking your browser) he will have no trouble looki… Continue reading Is it really safe to pass sensitive data to another script via stdin, compared to passing via arguments (Linux)

What is the best tool to prevent write access to the root on a Debian computer that can be turned on with a command?

I am on a Debian GNU/Linux, and i would like to be able to disable any write to the disk at some arbitrary time. It is ok, if i would need to reboot to re-enable the write access, but the best solution for me would be to not need to reboot… Continue reading What is the best tool to prevent write access to the root on a Debian computer that can be turned on with a command?