Hacker News new | past | comments | ask | show | jobs | submit login

Kernel vulnerabilities can be combined with user space vulnerabilities. eg a buggy web script might allow an attacker shell access under a restricted UID. The attacker could then use a kernel vulnerability to elevate their permissions to root.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: