Xorux LPAR2RRD: When Read-Only Users Go Rogue!
Brace yourself: a read-only user exploit in Xorux LPAR2RRD can crash processes faster than a narcoleptic sheep. The vulnerability lets attackers stop processes, causing denial of service. But fear not, version 8.05 has the fix! Stay updated and keep those virtual appliances running smoother than a greased lightning bolt.

Hot Take:
Who knew being a read-only user could be so powerful? In a world where we lock up our data tighter than a miser with his gold, it turns out that even the humble read-only user can bring down the house! Xorux’s LPAR2RRD system forgot to tell its doors from its doorknobs, allowing users with minimal privileges to waltz in and turn off the lights on their way out. It’s like giving someone a library card and finding out they can shut down the entire library! Time for Xorux to patch up and stop this literary nightmare from becoming a DoS disaster.
Key Points:
- The vulnerability affects Xorux’s LPAR2RRD version 8.04 and earlier.
- Authenticated, read-only users can cause a denial of service by terminating processes.
- Affected systems are primarily running on Rocky Linux 8.10.
- Xorux issued a patch with version 8.05 to address the issue.
- The vulnerability was discovered by KoreLogic and publicly disclosed on July 28, 2025.