Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a critical Linux privilege escalation vulnerability that poses significant security risks to system administrators and users. Discover how hackers exploit these dangerous vulnerabilities to elevate their system privileges from standard user access to dangerous administrative levels. Learn about the technical details behind CVE-2025-6018 and understand the chained local privilege escalation (LPE) attack vectors that affect SUSE 15 systems through PAM and libblockdev/udisks components. Examine real-world examples of how these exploits work in practice and understand why privilege escalation vulnerabilities represent some of the most critical security threats in the Linux ecosystem. Gain insights into the methods attackers use to chain multiple vulnerabilities together to achieve full root access, and understand the implications for system security and defense strategies.
Syllabus
Linux Has A New Problem…
Taught by
Low Level Learning