{"id":39884,"date":"2021-03-04T15:27:32","date_gmt":"2021-03-04T15:27:32","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32077\/Researcher-Finds-5-Privilege-Escalation-Vulns-In-Linux-Kernel.html"},"modified":"2021-03-04T15:27:32","modified_gmt":"2021-03-04T15:27:32","slug":"researcher-finds-5-privilege-escalation-vulns-in-linux-kernel","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/","title":{"rendered":"Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel"},"content":{"rendered":"<div class=\"wysiwyg\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"614\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/2020\/11\/GettyImages-72266809-e1604954206455-1024x614.jpg\" alt class=\"wp-image-109588\" srcset=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/2020\/11\/GettyImages-72266809-e1604954206455-1024x614.jpg 1024w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2020\/11\/GettyImages-72266809-e1604954206455-300x180.jpg 300w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2020\/11\/GettyImages-72266809-e1604954206455-768x461.jpg 768w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2020\/11\/GettyImages-72266809-e1604954206455-860x516.jpg 860w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2020\/11\/GettyImages-72266809-e1604954206455-156x94.jpg 156w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2020\/11\/GettyImages-72266809-e1604954206455-312x187.jpg 312w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2020\/11\/GettyImages-72266809-e1604954206455-640x384.jpg 640w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2020\/11\/GettyImages-72266809-e1604954206455.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><figcaption>Oracle Co-Founder Larry Ellison delivers a keynote address at the Oracle OpenWorld conference in 2006. A researcher found five similar vulnerabilities in the kernel of Linux operating systems that can allow an attacker to escalate local privileges on a victim\u2019s network. (Justin Sullivan\/Getty Images)<\/figcaption><\/figure>\n<p>A researcher at Positive Technologies found five similar vulnerabilities in the kernel of Linux operating systems that can allow an attacker to escalate local privileges on a victim\u2019s network.<\/p>\n<p>The flaws, discovered by security researcher Alexander Popov, could allow an attacker to potentially steal data, run administrative commands or install malware on operating systems or server applications. Popov was able to successfully test an exploit of one of the vulnerabilities on Fedora Server 33, notifying the<a href=\"https:\/\/www.linuxfoundation.org\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Linux Foundation<\/a>, a non-profit consortium designed to standardize support for the open-source Linux system, and other parties <a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2021\/02\/04\/5\" target=\"_blank\" rel=\"noreferrer noopener\">through email<\/a> on February 5.<\/p>\n<p>\u201cHello! Let me inform you about the Linux kernel vulnerabilities that I\u2019ve found in AF_VSOCK implementation. I managed to exploit one of them for a local privilege escalation on Fedora Server 33 for x86_64, bypassing SMEP and SMAP,\u201d Popov wrote to the group, adding he planned to share more details about the exploit techniques with them \u201clater.\u201d &nbsp;<\/p>\n<p>Popov said in the email that he had already developed a patch and followed responsible disclosure guidelines throughout the process. He submitted his findings to the National Institute of Standards and Technologies\u2019 National Vulnerability Database, which developed them into <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26708\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-26708<\/a>.<\/p>\n<p>The vulnerabilities received a 7.0 out of 10 for severity by the Common Vulnerability Scoring System. According to Popov, the vulnerable kernel modules are race conditions that are present in all major GNU\/Linux distributions and automatically load when creating a socket through the AF_VSOCK core, <a href=\"https:\/\/www.man7.org\/linux\/man-pages\/man7\/vsock.7.html\" target=\"_blank\" rel=\"noreferrer noopener\">which is designed<\/a> to communicate between guest virtual machines and their host.<\/p>\n<p>Privilege escalation vulnerabilities are considered particularly dangerous because of the level of control it can give an attacker within a victim network. &nbsp;In a <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/ransomware\/researchers-identify-223-vulnerabilities-used-in-recent-ransomware-attacks\/\">recent report<\/a> on vulnerabilities tied to ransomware operations, RiskSense classifies privilege escalation alongside remote code execution as the two types of vulnerabilities that \u201csignificantly increases risk to an organization.\u201d<\/p>\n<p>They also found that such vulnerabilities are becoming increasingly popular among cybercriminals and security researchers, with more than 25% of newly published Common Vulnerabilities and Exposure (CVE) records this past year containing some component of privilege escalation or remote code execution.<\/p>\n<p>Popov has found at least two other privilege escalation vulnerabilities in Linux kernels, <a href=\"http:\/\/blog.ptsecurity.com\/2020\/03\/cve-2019-18683-exploiting-linux-kernel.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2019-18683<\/a> in 2019 and <a href=\"http:\/\/blog.ptsecurity.com\/2017\/03\/cve-2017-2636-exploit-race-condition-in.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2017-2636<\/a> in 2017. &nbsp;&nbsp;<\/p>\n<\/p><\/div>\n<section class=\"post-tags\">\n<h2>Topics:<\/h2>\n<p> <a href=\"https:\/\/www.scmagazine.com\/tag\/patch-management\/\" class=\"button -secondary\">Patch management<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/threat-intelligence\/\" class=\"button -secondary\">Threat intelligence<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/vulnerability-management\/\" class=\"button -secondary\">Vulnerability Management<\/a> <\/section>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32077\/Researcher-Finds-5-Privilege-Escalation-Vulns-In-Linux-Kernel.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39885,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[3707],"class_list":["post-39884","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinelinuxflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-04T15:27:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"614\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel\",\"datePublished\":\"2021-03-04T15:27:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/\"},\"wordCount\":433,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel.jpg\",\"keywords\":[\"headline,linux,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/\",\"name\":\"Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel.jpg\",\"datePublished\":\"2021-03-04T15:27:32+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel.jpg\",\"width\":1024,\"height\":614},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,linux,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinelinuxflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/","og_locale":"en_US","og_type":"article","og_title":"Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-04T15:27:32+00:00","og_image":[{"width":1024,"height":614,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel","datePublished":"2021-03-04T15:27:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/"},"wordCount":433,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel.jpg","keywords":["headline,linux,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/","url":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/","name":"Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel.jpg","datePublished":"2021-03-04T15:27:32+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel.jpg","width":1024,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/researcher-finds-5-privilege-escalation-vulns-in-linux-kernel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,linux,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinelinuxflaw\/"},{"@type":"ListItem","position":3,"name":"Researcher Finds 5 Privilege Escalation Vulns In Linux Kernel"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39884"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39884\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39885"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}