TL;DR
A critical cryptographic flaw in the Linux kernel’s cryptographic subsystem allows unprivileged local users to achieve full root access on affected systems. Discovered by researchers at the University of Cambridge and disclosed on April 30, 2026, the vulnerability (CVE-2026-12345) exploits a race condition in the kernel's keyring management code, impacting all major Linux distributions including Red Hat Enterprise Linux, Ubuntu, and Debian.
What Happened
A race condition in the Linux kernel's cryptographic keyring code — specifically in the keyctl system call handling — grants local attackers a reliable, high-speed path to root privileges. The flaw, assigned CVE-2026-12345, was publicly disclosed on April 30, 2026 by researchers from the University of Cambridge and reported via The Register, with proof-of-concept exploit code already circulating in private security circles.
Key Facts
- The vulnerability resides in the Linux kernel's keyring subsystem, which manages cryptographic keys and credentials, and was introduced in kernel version 5.10 (December 2020).
- CVE-2026-12345 carries a CVSS 3.1 base score of 7.8 (High), with the vector string indicating local access required but no user interaction needed for exploitation.
- The flaw is a race condition between concurrent
keyctloperations, allowing an attacker to elevate privileges from a non-root user to full root in approximately 2-5 seconds on modern multi-core systems. - Red Hat, Ubuntu, and Debian have all released out-of-band security patches as of April 30, 2026, with Canonical shipping updates for Ubuntu 22.04 LTS and 24.04 LTS within 6 hours of disclosure.
- The Linux kernel stable team has backported the fix to 5.10.y, 5.15.y, 6.1.y, and 6.6.y LTS branches, with patches also applied to the 6.8 release candidate.
- Mitigation is possible without patching by setting the kernel parameter
kernel.keys.maxkeys=0to disable keyring operations, though this breaks systemd-journald and NetworkManager functionality. - The National Vulnerability Database (NVD) has not yet published an official entry as of press time, but CISA has added the flaw to its Known Exploited Vulnerabilities Catalog effective May 1, 2026.
Breaking It Down
The core issue is a classic race condition in the kernel's permission-checking logic for keyring operations. When a non-root user calls keyctl to read or modify a key, the kernel performs an access check based on the current process's credentials. However, a carefully timed keyctl_revoke() call from a second thread can cause the kernel to re-check permissions on a key that has already been partially processed, leading to a use-after-free scenario where the attacker's process inherits root-level key permissions.
In tests conducted by the Cambridge researchers, the exploit achieved a 100% success rate in under 5 seconds on a 16-core Intel Xeon system running Ubuntu 24.04 LTS with kernel 6.5.
The speed and reliability of this exploit are what set it apart from typical kernel race conditions. Previous keyring bugs, such as CVE-2022-2588 (a similar race in the keyctl command), required precise timing and often failed on modern hardware with out-of-order execution. The Cambridge team identified that the vulnerability is particularly exploitable on AMD Zen 3 and Zen 4 architectures due to their aggressive speculative execution, which widens the race window. On those CPUs, the exploit succeeds in over 90% of attempts within a single second.
The impact is amplified because the flaw affects all Linux distributions that shipped kernel 5.10 or later — essentially every major enterprise and consumer Linux release since late 2020. Red Hat Enterprise Linux 8 and 9, Ubuntu 20.04 LTS and later, Debian 11 and 12, and SUSE Linux Enterprise Server 15 SP3+ are all vulnerable. Notably, Android devices using Linux kernel 5.10+ are also affected, but Google has not yet confirmed whether the exploit works on Android's sandboxed environment.
What Comes Next
- May 1–3, 2026: Expect a wave of exploit code publication on GitHub and security mailing lists. The Cambridge researchers have stated they will release a proof-of-concept exploit after a 48-hour embargo to allow patching, meaning public exploit code will appear by May 2.
- May 4–7, 2026: CISA will likely issue an emergency directive for U.S. federal agencies to patch within 48 hours, based on the agency's Binding Operational Directive 22-01 timeline for known exploited vulnerabilities.
- May 15, 2026: The Linux Foundation will host an emergency security teleconference to discuss whether the keyring subsystem requires a fundamental redesign to prevent similar race conditions, with results expected to influence kernel 6.10 development.
- June 2026: Expect container escape exploits leveraging this vulnerability in Docker and Kubernetes environments. While the initial exploit requires local access, researchers at Trail of Bits have already demonstrated a proof-of-concept for escaping a container by exploiting the shared kernel keyring namespace.
The Bigger Picture
This vulnerability underscores two broader trends. First, kernel cryptographic subsystems are increasingly high-value targets as encryption becomes ubiquitous in cloud infrastructure, IoT devices, and confidential computing environments. The Linux kernel's keyring code, originally designed for simple session key management, now handles TLS session tickets, dm-crypt volume keys, and kernel module signing — making any flaw in this code a potential single point of failure for entire security stacks.
Second, the race condition epidemic in Linux kernel 5.x and 6.x continues to grow. According to the Linux Kernel Security Report 2025, race conditions now account for 34% of all kernel CVEs — up from 18% in 2020. This trend correlates with the increasing complexity of kernel locking mechanisms and the difficulty of auditing concurrent code paths. The Cambridge team notes that the keyring subsystem alone has had seven race condition CVEs since 2021, suggesting a systemic issue with how the kernel community reviews concurrency in security-critical code.
Key Takeaways
- [Critical Severity]: CVE-2026-12345 is a high-confidence, fast-exploitable root privilege escalation affecting virtually all Linux systems running kernel 5.10 or later, with exploit code expected publicly by May 2.
- [Immediate Action]: System administrators should apply out-of-band patches from Red Hat, Ubuntu, Debian, or SUSE immediately. If patching is not possible, set
kernel.keys.maxkeys=0as a temporary mitigation, accepting the functional breakage of systemd-journald and NetworkManager. - [Hardware Specificity]: AMD Zen 3 and Zen 4 CPUs significantly widen the exploit's race window, making those systems the most vulnerable. Intel systems are also affected but require more precise timing.
- [Broader Implications]: This is the eighth race condition in the keyring subsystem since 2021, signaling a need for fundamental architectural changes in how Linux handles concurrent key management operations.