Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical CentOS 9 Flaw Enables Root Privilege Escalation

Critical CentOS 9 Flaw Enables Root Privilege Escalation

Posted on February 6, 2026 By CWS

A significant vulnerability has been identified in the Linux kernel’s sch_cake queuing discipline (Qdisc) impacting CentOS 9 systems. This flaw allows local users to elevate their privileges to root, posing a serious security threat.

Details of the Vulnerability

SSD Secure Disclosure, a security research firm, released details of this vulnerability on February 5, 2026. The flaw, which won first place in the Linux category at the TyphoonPWN 2025 competition, is found in the cake_enqueue function of the CAKE Qdisc. It incorrectly returns a success status after dropping packets when buffer limits are exceeded.

This misleading behavior affects parent Qdiscs such as HFSC, resulting in improper state management and triggering a use-after-free (UAF) condition when dequeuing packets. Exploiting this vulnerability allows attackers to execute arbitrary code within the kernel, achieving local privilege escalation (LPE).

Technical Exploitation and Impact

The vulnerability is exploited when the buffer_used exceeds the buffer_limit, causing cake_enqueue to drop packets without indicating failure. In a hierarchical setup, HFSC continues to enqueue packets without error checking, leading to a dangling pointer scenario during packet dequeue operations. Attackers can exploit this by manipulating the queue with crafted control messages, leveraging a sprayed fake Qdisc with ROP gadgets for arbitrary code execution.

Although there is no CVSS score yet, the impact is deemed high as it enables a local attacker to gain root access on affected CentOS 9 systems utilizing the CAKE Qdisc. Red Hat, the upstream provider for CentOS, was notified over three months ago but has yet to release a patch.

Mitigation Strategies

To mitigate this vulnerability, system administrators are advised to avoid using the CAKE Qdisc by executing tc qdisc del dev lo root or switching to alternative queuing disciplines such as HTB. Monitoring tc commands and unusual network traffic is also recommended.

It is crucial to update the kernel once a patch is released and to disable any unnecessary Qdisc modules. Leveraging namespaces and user isolation techniques for high-risk workloads can further enhance security.

This vulnerability underscores the importance of auditing Qdisc usage within the kernel’s traffic control system. Administrators should address these risks promptly to maintain system integrity.

Stay informed with the latest cybersecurity updates by following us on Google News, LinkedIn, and X. Reach out if you have a story to share.

Cyber Security News Tags:buffer overflow, CAKE Qdisc, CentOS 9, Cybersecurity, HFSC, kernel exploitation, Linux kernel, local privilege escalation, Red Hat, root privilege escalation, ROP chain, security flaw, system security, use-after-free, Vulnerability

Post navigation

Previous Post: Zscaler Expands with SquareX Acquisition for Enhanced Browser Security
Next Post: CISA’s Ransomware Alerts in KEV: A Silent Update Challenge

Related Posts

Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Cyber Security News
Microsoft 365 Outage Disrupts North American Admin Access Microsoft 365 Outage Disrupts North American Admin Access Cyber Security News
8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users 8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users Cyber Security News
LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code Cyber Security News
Stealthy CastleLoader Malware Attacking US-Based Government Entities Stealthy CastleLoader Malware Attacking US-Based Government Entities Cyber Security News
HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark