Security Alerts blog

Linux Kernel Found 3 Year Old Vulnerabilities that Allow Root Access

“Bad Things Come in Threes.” Three historical vulnerabilities have been discovered in the Linux kernel. If exploited, it could be used to gain root access to those systems. The original researchers from the security firm GRIMM have stated that these vulnerabilities remained undiscovered for 15 years.

The vulnerabilities exist in the Linux kernel SCSI (Small Computer System Interface) module. While not loaded by default, the kernel’s support for on-demand loading of modules means that it can be called with ease. CentOS 8, Fedora, and all versions of RedHat Enterprise tested are vulnerable.

On Debian and Ubuntu systems, the modules are only loaded by the kernel if RDMA hardware is in use, meaning that although the scope is limited, the vulnerabilities are still present.

The impact:

If an attacker exploits one of the three CVEs, they can gain root privileges on Linux Operating Systems, the most privileged access on Unix-based systems.

Whilst these vulnerabilities are dangerous, an attacker must have an existing foothold on the host to exploit them. It is unlikely that an adversary can exploit this remotely as the module is not accessible externally. These vulnerabilities are labeled as Local Privilege Escalation (LPE).

The remediation:

Patches have been available since the 7th of March (2021), individuals running Linux-based hosts should upgrade their kernels to mitigate against the trio of vulnerabilities.

Source: Blog Grimm

Risk Crew

Share
Published by
Risk Crew
Tags: Linux Kernel

Recent Posts

ISO 42001: Key Insights You Need to Know

Introducing ISO 42001 – the world’s first international management system standard focused specifically on AI.…

3 months ago

ISO 27001 Requirements | Your Roadmap to Compliance

Data breaches and cyberattacks have become daily concerns for information security professionals and business leaders.…

3 months ago

How to Get Ready for a Penetration Test

It is an undeniable fact that all applications and infrastructures are essentially in need of…

5 months ago