CVE-2021-3490 – Pwning Linux kernel eBPF on Ubuntu
Researcher published an exploit code for a high-severity privilege escalation flaw in Linux kernel eBPF on Ubuntu machines...
https://securityaffairs.co/wordpress/120688/hacking/cve-2021-3490-linux-kernel-bug.html
@DevMisc
#linux #vulnerability #cve
Researcher published an exploit code for a high-severity privilege escalation flaw in Linux kernel eBPF on Ubuntu machines...
https://securityaffairs.co/wordpress/120688/hacking/cve-2021-3490-linux-kernel-bug.html
@DevMisc
#linux #vulnerability #cve
Linux Cheat Sheet For Beginners
If you're not using the terminal, Linux commands may appear scary at first by once you start using them you will understand them very easily On a Linux system, there are numerous commands for executing operations and procedures...
https://dev.to/suhailkakar/linux-cheat-sheet-for-beginners-5830
@DevMisc
#linux #security #cheatsheet
If you're not using the terminal, Linux commands may appear scary at first by once you start using them you will understand them very easily On a Linux system, there are numerous commands for executing operations and procedures...
https://dev.to/suhailkakar/linux-cheat-sheet-for-beginners-5830
@DevMisc
#linux #security #cheatsheet
DistroTest - Test it before you hate it...
On this website you will find many operating systems, which you can test directly online without a installation.
https://distrotest.net/
@DevMisc
#misc #linux #os
On this website you will find many operating systems, which you can test directly online without a installation.
https://distrotest.net/
@DevMisc
#misc #linux #os
How to set up Windows Subsystem for Linux (WSL)
Are you a programmer, engineer, or student who wants to run Linux tools, but you're stuck with a Windows Computer? The solution is WSL!
https://medium.com/@josiah.alen.brown/how-to-set-up-windows-subsystem-for-linux-wsl
@DevMisc
#wsl #linux #workflow
Are you a programmer, engineer, or student who wants to run Linux tools, but you're stuck with a Windows Computer? The solution is WSL!
https://medium.com/@josiah.alen.brown/how-to-set-up-windows-subsystem-for-linux-wsl
@DevMisc
#wsl #linux #workflow
JSLinux
Run Linux or other Operating Systems in your browser!
https://bellard.org/jslinux/
@DevMisc
#web #linux #misc
Run Linux or other Operating Systems in your browser!
https://bellard.org/jslinux/
@DevMisc
#web #linux #misc
A file even root can't delete! [
https://youtu.be/eXUCrIhTsM0
@DevMisc
#linux #filesystem #misc
chattr +i
]https://youtu.be/eXUCrIhTsM0
@DevMisc
#linux #filesystem #misc
👍2
How efficient can cat(1) be?
Various methods to create your own
https://ariadne.space/2022/07/17/how-efficient-can-cat1-be/
@DevMisc
#linux #c #coreutils #misc
Various methods to create your own
cat
(with code), and comparisons between said methods.https://ariadne.space/2022/07/17/how-efficient-can-cat1-be/
@DevMisc
#linux #c #coreutils #misc
🔥2💩1
How to (Kinda) Download More RAM
That's right. Jest no more.
https://blog.horner.tj/how-to-kinda-download-more-ram
@DevMisc
#fun #linux #misc
That's right. Jest no more.
https://blog.horner.tj/how-to-kinda-download-more-ram
@DevMisc
#fun #linux #misc
🐳7
⚠️ RegreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
@DevMisc (🟠 comments)
#security #ssh #linux
- The vulnerability is a regression of a previous issue (CVE-2006-5051) that was introduced in OpenSSH 8.5p1 in October 2020.
- The vulnerability allows for remote code execution as root on glibc-based Linux systems due to the SIGALRM handler calling non-async-signal-safe functions like syslog().
- Older vulnerable OpenSSH versions like 3.4p1 and 4.2p1 can be exploited by interrupting free() calls and leveraging heap corruption techniques like unlink() and House of Mind.
- Newer vulnerable versions like 9.2p1 can be exploited by interrupting malloc() calls and corrupting FILE structures to gain arbitrary code execution.
- Precise timing and network delay mitigation techniques are critical to winning the signal handler race condition.
- The exploit requires carefully crafting the heap layout and leveraging leftover data from previous allocations.
- OpenBSD is not vulnerable because it uses a safer syslog_r() function in its SIGALRM handler.
- The vulnerability is present in the default configuration of OpenSSH and affects the privileged sshd process.
- Significant effort and multiple iterations were required to develop reliable exploits for the different OpenSSH versions.
- The research demonstrates the continued need for vigilance in secure software development, as even a well-designed system like OpenSSH can have subtle regressions that introduce critical vulnerabilities.
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
@DevMisc (
#security #ssh #linux
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2