CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Public exploit for PinTheft Linux kernel privilege escalation vulnerability released

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A proof-of-concept exploit for the PinTheft Linux kernel privilege escalation vulnerability has been publicly released, enabling local attackers to gain root access on Arch Linux systems. The flaw is a zero-copy double-free bug in the Linux kernel's Reliable Datagram Sockets (RDS) implementation that allows page-cache overwrites through io_uring fixed buffers. Exploitation requires the RDS kernel module to be loaded, io_uring enabled, a readable SUID-root binary, and x86_64 support. Successful exploitation leads to arbitrary root shell acquisition via stolen FOLL_PIN references.

Timeline

  1. 20.05.2026 13:52 1 articles · 9h ago

    PinTheft PoC exploit released, enabling root escalation on Arch Linux systems

    A fully functional proof-of-concept exploit for the PinTheft Linux kernel privilege escalation vulnerability was released by V12. The exploit leverages a RDS zero-copy double-free bug to overwrite page cache via io_uring fixed buffers, enabling local attackers to steal FOLL_PIN references and obtain root shells. Exploitation requires specific kernel configurations: RDS module loaded, io_uring enabled, readable SUID-root binary, and x86_64 support. The RDS module is enabled by default only on Arch Linux, restricting the attack surface. The flaw was patched earlier in May 2026, but the public exploit increases exposure risk for unpatched systems.

    Show sources

Information Snippets