Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical CentOS 9 Flaw Enables Root Privilege Escalation

Critical CentOS 9 Flaw Enables Root Privilege Escalation

Posted on February 6, 2026 By CWS

A significant vulnerability has been identified in the Linux kernel’s sch_cake queuing discipline (Qdisc) impacting CentOS 9 systems. This flaw allows local users to elevate their privileges to root, posing a serious security threat.

Details of the Vulnerability

SSD Secure Disclosure, a security research firm, released details of this vulnerability on February 5, 2026. The flaw, which won first place in the Linux category at the TyphoonPWN 2025 competition, is found in the cake_enqueue function of the CAKE Qdisc. It incorrectly returns a success status after dropping packets when buffer limits are exceeded.

This misleading behavior affects parent Qdiscs such as HFSC, resulting in improper state management and triggering a use-after-free (UAF) condition when dequeuing packets. Exploiting this vulnerability allows attackers to execute arbitrary code within the kernel, achieving local privilege escalation (LPE).

Technical Exploitation and Impact

The vulnerability is exploited when the buffer_used exceeds the buffer_limit, causing cake_enqueue to drop packets without indicating failure. In a hierarchical setup, HFSC continues to enqueue packets without error checking, leading to a dangling pointer scenario during packet dequeue operations. Attackers can exploit this by manipulating the queue with crafted control messages, leveraging a sprayed fake Qdisc with ROP gadgets for arbitrary code execution.

Although there is no CVSS score yet, the impact is deemed high as it enables a local attacker to gain root access on affected CentOS 9 systems utilizing the CAKE Qdisc. Red Hat, the upstream provider for CentOS, was notified over three months ago but has yet to release a patch.

Mitigation Strategies

To mitigate this vulnerability, system administrators are advised to avoid using the CAKE Qdisc by executing tc qdisc del dev lo root or switching to alternative queuing disciplines such as HTB. Monitoring tc commands and unusual network traffic is also recommended.

It is crucial to update the kernel once a patch is released and to disable any unnecessary Qdisc modules. Leveraging namespaces and user isolation techniques for high-risk workloads can further enhance security.

This vulnerability underscores the importance of auditing Qdisc usage within the kernel’s traffic control system. Administrators should address these risks promptly to maintain system integrity.

Stay informed with the latest cybersecurity updates by following us on Google News, LinkedIn, and X. Reach out if you have a story to share.

Cyber Security News Tags:buffer overflow, CAKE Qdisc, CentOS 9, Cybersecurity, HFSC, kernel exploitation, Linux kernel, local privilege escalation, Red Hat, root privilege escalation, ROP chain, security flaw, system security, use-after-free, Vulnerability

Post navigation

Previous Post: Zscaler Expands with SquareX Acquisition for Enhanced Browser Security
Next Post: CISA’s Ransomware Alerts in KEV: A Silent Update Challenge

Related Posts

October Sees Rise in Phishing and Ransomware Attacks, Including TyKit and Google Careers Scams October Sees Rise in Phishing and Ransomware Attacks, Including TyKit and Google Careers Scams Cyber Security News
Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Cyber Security News
Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature Cyber Security News
DarkCloud Stealer Attacking Financial Companies With Weaponized RAR Attachments DarkCloud Stealer Attacking Financial Companies With Weaponized RAR Attachments Cyber Security News
Shanya EDR Killer Leveraged by Hackers to Clear the Way for Ransomware Infection Shanya EDR Killer Leveraged by Hackers to Clear the Way for Ransomware Infection Cyber Security News
Unpatched BitLocker Flaws Expose Windows Systems Unpatched BitLocker Flaws Expose Windows Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark