Exploit released for new PinTheft Arch Linux root escalation flaw

Exploit released for new PinTheft Arch Linux root escalation flaw

A new proof-of-concept exploit for the patched Linux privilege escalation flaw PinTheft can let local attackers gain root on Arch Linux systems under specific conditions. The issue affects the RDS kernel module and comes amid other recently disclosed Linux LPE bugs, including DirtyDecrypt, DirtyCBC, Copy Fail, and Pack2TheRoot. #PinTheft #ArchLinux #RDS #DirtyDecrypt #DirtyCBC #CopyFail #Pack2TheRoot

Keypoints

  • PinTheft is a newly patched Linux privilege escalation flaw with a public PoC exploit.
  • The bug affects the Linux kernel RDS zerocopy send path and can lead to root access.
  • Exploitation requires the RDS module, io_uring, a readable SUID-root binary, and x86_64 support.
  • The RDS module is enabled by default on Arch Linux among common distributions tested.
  • Users are urged to install kernel updates or disable the RDS modules to reduce risk.

Read More: https://www.bleepingcomputer.com/news/linux/exploit-released-for-new-pintheft-arch-linux-root-escalation-flaw/