{"id":4760,"date":"2017-10-16T13:57:06","date_gmt":"2017-10-16T17:57:06","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall17\/?p=4760"},"modified":"2017-10-16T17:57:41","modified_gmt":"2017-10-16T21:57:41","slug":"yet-another-linux-kernel-privilege-escalation-bug-discovered","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/2017\/10\/16\/yet-another-linux-kernel-privilege-escalation-bug-discovered\/","title":{"rendered":"Yet Another Linux Kernel Privilege-Escalation Bug Discovered"},"content":{"rendered":"<p>Recently, security researchers have discovered a new privilege-escalation vulnerability in Linux kernel that could allow a local attacker to execute code on the affected systems with elevated privileges. In the article, it describes that an attacker with local access to the targeted system, they can execute a maliciously crafted application on a targeted system which allows the attackers to elevate his privilege to root on the targeted system. Besides that, the article also mentions that the vulnerability affects major distributions of the Linux operating system including RedHat, Debian, Ubuntu, and Suse.<\/p>\n<p>&nbsp;<\/p>\n<p>https:\/\/thehackernews.com\/2017\/10\/linux-privilege-escalation.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, security researchers have discovered a new privilege-escalation vulnerability in Linux kernel that could allow a local attacker to execute code on the affected systems with elevated privileges. In the article, it describes that an attacker with local access to the targeted system, they can execute a maliciously crafted application on a targeted system which [&hellip;]<\/p>\n","protected":false},"author":12917,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[716352],"tags":[],"class_list":{"0":"post-4760","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-07-policy-documents-video","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/users\/12917"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/comments?post=4760"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4760\/revisions"}],"predecessor-version":[{"id":4761,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4760\/revisions\/4761"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/media?parent=4760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/categories?post=4760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/tags?post=4760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}