Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Nine-year-old Linux kernel flaw allows major distributions to run root commands

Promoting clothing recycling in Europe with AI-powered condition assessment

My password is about to disappear. Biometric security will replace it.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Nine-year-old Linux kernel flaw allows major distributions to run root commands
Identity

Nine-year-old Linux kernel flaw allows major distributions to run root commands

By May 21, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananMay 21, 2026Linux / Vulnerabilities

Cybersecurity researchers have revealed details of a vulnerability in the Linux kernel that went undetected for nine years.

This vulnerability, tracked as CVE-2026-46333 (CVSS score: 5.5), is a case of improper privilege management that could allow unprivileged local users to disclose sensitive files or execute arbitrary commands as root on default installations of several major distributions, including Debian, Fedora, and Ubuntu. The code name is also ssh-keysign-pwn.

According to Qualys, which discovered the flaw, the issue is caused by the kernel’s __ptrace_may_access() function, which was introduced in November 2016.

“Primitives are reliable and turn any local shell into a path to root or sensitive credentials,” said Saeed Abbasi, senior manager in Qualys’ threat research unit.

Successful exploitation of this flaw could allow a local attacker to expose /etc/shadow, host private keys under /etc/ssh/*_key, and execute arbitrary commands as root via four different exploits targeting chage, ssh-keysign, pkexec, and accounts-daemon.

This disclosure follows the release of a proof-of-concept (PoC) exploit for this vulnerability last week, shortly after a public kernel commit was revealed. CVE-2026-46333 is the latest security vulnerability to be disclosed in the Linux kernel, following last month’s Copy Fail, Dirty Frag, and Fragnesia.

We recommend applying the latest kernel updates released by your Linux distribution. If the update cannot be performed immediately, a temporary workaround includes increasing “kernel.yama.ptrace_scope” to 2.

“Hosts that allow untrusted local users during the exposure period treat SSH host keys and locally cached credentials as potentially exposed,” Qualys said. “Rotate the host key and check the administrative material present in memory for the set-uid process.”

This development follows the release of a PoC for a local privilege escalation flaw called PinTheft that allows local attackers to gain root privileges on Arch Linux systems. This exploit requires the target system to have the Reliable Datagram Sockets (RDS) module loaded, io_ring enabled, a readable SUID root binary, and x86_64 support for the included payload.

“PinTheft is a Linux local privilege escalation exploit against RDS zero-copy double-free that can be turned into page cache overwriting with fixed-buffer io_uring,” Zelick and the V12 security team said.

“This bug existed in the RDS zero-copy send path. rds_message_zcopy_from_user() pins user pages one at a time. If a later page fails, the page that was already pinned by the error path is removed, and a subsequent RDS message cleanup removes it again. This causes the scatter list to persist even after the zcopy notifier is cleared. Because the entry and number of entries remain alive, one reference can be stolen from the first page for each failed zero-copy submission.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePromoting clothing recycling in Europe with AI-powered condition assessment

Related Posts

GitHub internal repository compromised via malicious Nx console VS Code extension

May 21, 2026

Highly critical Drupal core flaw exposes PostgreSQL sites to RCE attacks

May 21, 2026

Microsoft open sources RAMPART and Clarity to protect AI agents during development

May 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Nine-year-old Linux kernel flaw allows major distributions to run root commands

Promoting clothing recycling in Europe with AI-powered condition assessment

My password is about to disappear. Biometric security will replace it.

GitHub internal repository compromised via malicious Nx console VS Code extension

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.