Skip to main content
See every side of every news story
Published loading...Updated

9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros

Summary by unsafe.sh
Cybersecurity researchers have disclosed details of a vulnerability in the Linux kernel that remain
DisclaimerThis story is only covered by news sources that have yet to be evaluated by the independent media monitoring agencies we use to assess the quality and reliability of news outlets on our platform. Learn more here.

5 Articles

A newly discovered security vulnerability in the Linux kernel threatens systems such as Debian, Ubuntu and Fedora. Local attackers can gain root rights. Security analysts of IT security company Qualys have revealed a serious vulnerability in the Linux kernel that remained undetected over a period of nine years. The security vulnerability is listed under the CVE-2026-46333 identifier and has a CVSS value of 5.5. Despite the moderate classificatio…

A flaw hidden for 9 years in the Linux kernel, this is what Qualys researchers have just dug up. Its small name is ssh-keysign-pwn or DirtyDecrypt (CVE-2026-46333 for intimates), and it allows any local user without privileges to pass root, read your /etc/shadow and steal the private SSH keys of your server. And this bug was sleeping there since November 2016, i.e. since version 4.10 of the kernel. No one had ever seen it and as much to say to y…

Read Full Article
Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • There is no tracked Bias information for the sources covering this story.

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

The Hacker News broke the news on Thursday, May 21, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal