A conceptual problem in the memory management area of Linux allows local attackers to execute code at root level. The problem is caused by potential overlaps between the memory areas of the stack and shared memory segments, according to a report by Rafal Wojtczuk. A high-severity vulnerability in. sudo has been patched in a number of Linux distributions; the flaw allows local. attackers to elevate. privileges to root. A 48-character attack that crashes Linux servers, but experts argue the security implications of the bug.
Source: https://threatpost.com/bug-linux-kernel-allows-root-privileges-081910/74352/

