A vulnerability in the Linux sudo command has been discovered that could allow unprivileged users to execute commands as root. Thankfully, this vulnerability only works in non-standard configurations ...
The bug allows users to bypass privilege restrictions to execute commands as root. A vulnerability in Sudo, a core command utility for Linux, could allow a user to execute commands as a root user even ...
Sudo, the main command in Linux that allows users to run tasks, has been found to have a vulnerability that allows unauthorized users to execute commands as a root user. The vulnerability, known as ...
There was a time when real system administrators just logged into Unix systems as root. But as we all know — with great power comes great responsibility. It’s too easy to do terrible things when you ...
IT之家 6 月 18 日消息,安全研究人员发现了两种新的本地权限提升漏洞(LPE),攻击者可以利用这些漏洞完全控制系统,或获得 root 权限,影响主要的 Linux 发行版。这一发现引起了全球系统管理员的警惕。 第一个漏洞,编号 CVE-2025-6018,存在于 openSUSE Leap 15 和 ...
SecureLayer7 安全研究人员近日公布了一个影响 Linux 系统的安全漏洞(CVE-2025-6019)的技术细节和概念验证(PoC)利用代码。该漏洞影响依赖 udisksd 守护进程和 libblockdev 后端的 Linux 发行版,包括 Fedora 和 SUSE。在配置不当的环境中,该漏洞可被轻易利用,允许 allow ...
One of the major reasons behind choosing Linux as an operating system is that it’s much more secure than Windows. There are plenty of reasons for this including appropriate user permissions, ...
IT之家 7 月 2 日消息,科技媒体 borncity 昨日(7 月 1 日)发布博文,报道称 Linux 中的 sudo 命令存在严重漏洞,被攻击者利用,可以提前权限至 root 级别。 IT之家援引博文介绍,该漏洞追踪编号为 CVE-2025-32463,其根源在于系统不当处理 /etc/ nsswitch.conf 文件,可能 ...
Linux might sound scary for first-time Linux users, but actually, it isn’t. Linux is a bunch of open-source Unix operating systems based on Linux Kernel. These operating systems are called Linux ...