Linux Kernel Vulnerability that Allows Local Attackers to Escalate Privileges easydealssb, easydealssc

The Security Researcher Alexander Popov found vulnerabilities in the kernel of Linux operating systems that could allow an attacker to escalate local privileges on a victim’s network.
The flaw could allow an attacker to potentially steal data, run administrative commands or install malware on operating systems or server applications.
Popov was able to successfully test an exploit of one of the vulnerabilities on Fedora Server 33, notifying the Linux Foundation, a non-profit consortium designed to standardize support for the open-source Linux system, and other parties through email on February 5.
Popov mentioned in the email that he had already developed a patch and followed responsible disclosure guidelines throughout the process.
Privilege escalation vulnerabilities are system flaws that grant a malicious user excessive or wrong permissions after they have authenticated themselves. These are distinct from session hijacking vulnerabilities that allow an attacker to impersonate another user.
Privilege escalation vulnerabilities are considered dangerous because of the level of control they can give an attacker within a victim network. 
RiskSense, Inc., classifies in a recent report that “Privilege escalation along with remote code execution as the two types of vulnerabilities that significantly increases the risk to an organization.”
The vulnerabilities received a 7.0 out of 10 for severity by the Common Vulnerability Scoring System.
The researcher has found two other privilege escalation vulnerabilities in Linux kernels,
CVE-2019-18683 in 2019, Exploiting a Linux kernel vulnerability in the V4L2 subsystem and CVE-2017-2636 in 2017, Exploit the race condition in the n_hdlc Linux kernel driver bypassing SMEP.
Finally, such vulnerabilities are becoming more and more popular among cybercriminals and security researchers, with more than 25% of newly published Common Vulnerabilities and Exposure (CVE) records this past year containing some component of privilege escalation or remote code execution.
Also Read
NSA Revealed A Russian APT28 Hackers Made Previously Undisclosed Stealthy “Drovorub” Linux Malware
BootHole Vulnerability Affects Millions of Windows and Linux Systems – Allows Attackers to Install Stealthy Malware
easydealssb easydealssc