Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical CentOS 9 Flaw Enables Root Privilege Escalation

Critical CentOS 9 Flaw Enables Root Privilege Escalation

Posted on February 6, 2026 By CWS

A significant vulnerability has been identified in the Linux kernel’s sch_cake queuing discipline (Qdisc) impacting CentOS 9 systems. This flaw allows local users to elevate their privileges to root, posing a serious security threat.

Details of the Vulnerability

SSD Secure Disclosure, a security research firm, released details of this vulnerability on February 5, 2026. The flaw, which won first place in the Linux category at the TyphoonPWN 2025 competition, is found in the cake_enqueue function of the CAKE Qdisc. It incorrectly returns a success status after dropping packets when buffer limits are exceeded.

This misleading behavior affects parent Qdiscs such as HFSC, resulting in improper state management and triggering a use-after-free (UAF) condition when dequeuing packets. Exploiting this vulnerability allows attackers to execute arbitrary code within the kernel, achieving local privilege escalation (LPE).

Technical Exploitation and Impact

The vulnerability is exploited when the buffer_used exceeds the buffer_limit, causing cake_enqueue to drop packets without indicating failure. In a hierarchical setup, HFSC continues to enqueue packets without error checking, leading to a dangling pointer scenario during packet dequeue operations. Attackers can exploit this by manipulating the queue with crafted control messages, leveraging a sprayed fake Qdisc with ROP gadgets for arbitrary code execution.

Although there is no CVSS score yet, the impact is deemed high as it enables a local attacker to gain root access on affected CentOS 9 systems utilizing the CAKE Qdisc. Red Hat, the upstream provider for CentOS, was notified over three months ago but has yet to release a patch.

Mitigation Strategies

To mitigate this vulnerability, system administrators are advised to avoid using the CAKE Qdisc by executing tc qdisc del dev lo root or switching to alternative queuing disciplines such as HTB. Monitoring tc commands and unusual network traffic is also recommended.

It is crucial to update the kernel once a patch is released and to disable any unnecessary Qdisc modules. Leveraging namespaces and user isolation techniques for high-risk workloads can further enhance security.

This vulnerability underscores the importance of auditing Qdisc usage within the kernel’s traffic control system. Administrators should address these risks promptly to maintain system integrity.

Stay informed with the latest cybersecurity updates by following us on Google News, LinkedIn, and X. Reach out if you have a story to share.

Cyber Security News Tags:buffer overflow, CAKE Qdisc, CentOS 9, Cybersecurity, HFSC, kernel exploitation, Linux kernel, local privilege escalation, Red Hat, root privilege escalation, ROP chain, security flaw, system security, use-after-free, Vulnerability

Post navigation

Previous Post: Zscaler Expands with SquareX Acquisition for Enhanced Browser Security
Next Post: CISA’s Ransomware Alerts in KEV: A Silent Update Challenge

Related Posts

New Research Details on What Happens to Data Stolen in a Phishing Attack New Research Details on What Happens to Data Stolen in a Phishing Attack Cyber Security News
Wing FTP Server Vulnerability Actively Exploited Wing FTP Server Vulnerability Actively Exploited Cyber Security News
VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack Cyber Security News
Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence Cyber Security News
China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure Cyber Security News
Google Gemini Privacy Controls Bypassed to Access Private Meeting Data Using Calendar Invite Google Gemini Privacy Controls Bypassed to Access Private Meeting Data Using Calendar Invite Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News