New Linux LPE, 5.10 and above (ptrace_may_access mm-NULL + pidfd_getfd)

리눅스 커널 5.10 이상 버전에서 발견된 로컬 권한 상승(LPE) 취약점은 __ptrace_may_access() 함수가 task->mm가 NULL일 때 dumpable 체크를 건너뛰는 점을 악용합니다. 이로 인해 비권한 사용자가 pidfd_getfd()를 통해 루트 권한 파일인 SSH 호스트 키와 /etc/shadow 파일을 탈취할 수 있습니다. 해당 취약점은 6년 전부터 알려졌으며, Qualys가 보고하고 Linus Torvalds가 2026년 5월 14일에 패치했습니다. 여러 주요 리눅스 배포판에서 영향을 받으며, 공개된 PoC 코드를 통해 실제 공격 재현이 가능합니다.

https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn

#linux #security #lpe #kernel #ptrace

GitHub - 0xdeadbeefnetwork/ssh-keysign-pwn: Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels.

Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels. - 0xdeadbeefnetwork/ssh-keysign-pwn

GitHub

I am wondering if the slow but steady release of all these LPE (Local Privilege Escalation) bugs is an attempt to exhaust sysadmins teams worldwide and gain an opportunity to exploit despite looking as response disclosure.

Then again why at that point disclose at all and not just keep the zero-day to yourself.

#lpe #linux #security

And because one or two #LPEs per week is not enough, here's your daily dose of #Linux #LPE. This one goes back to at least kernel 5.10. No real mitigations to apply this time.

https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn

GitHub - 0xdeadbeefnetwork/ssh-keysign-pwn: Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels.

Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels. - 0xdeadbeefnetwork/ssh-keysign-pwn

GitHub

@cadey

"Ah shit, here we go again…"

#linux #lpe #0day

A new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel.

Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions.

https://thehackernews.com/2026/05/linux-kernel-dirty-frag-lpe-exploit.html

Well, after reading "Integrated By Design", Vivian Voss's book...

https://shorturl.at/8v8W0

...it's clear why. IMO the book is a must if you are working with #linux
or starting with #bsd #freeBSD #openbsd #ghostbsd

#security #vulnerability #hacking #lpe

Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

Dirty Frag exposes Linux systems to root escalation through chained kernel flaws, impacting Ubuntu, RHEL, Fedora, and others.

The Hacker News

Keep calm that they keep on coming... Better fire up you mitigations because this is probably going to take a while to patch fully.

https://lore.kernel.org/netdev/agVpIsaSherjHTYg@sultan-box/

#fragnesia #linux #lpe

Re: [PATCH net v2] net: skbuff: propagate shared-frag marker through frag-transfer helpers - Sultan Alsawaf

Learn how Fragnesia (Copy Fail 3.0) exploits a Linux kernel logic bug to achieve 100% reliable root access. Find out if your distro is affected and how to patch.

Full details here: https://ostechnix.com/fragnesia-linux-root-exploit-copy-fail-3/

#Fragnesia #Copyfail30 #LPE #Linuxkernel #LocalPrivilegeEscalation #Security #Linux

Fragnesia: The "Copy Fail 3.0" Exploit Granting 100% Linux Root - OSTechNix

Learn how Fragnesia (Copy Fail 3.0) exploits a Linux kernel logic bug to achieve 100% reliable root access. Find out if your distro is affected and how to patch.

OSTechNix

Jour férié en fin de semaine en France, jour de #LPE (exploit Linux accessible aux utilisateurs) :

https://security-tracker.debian.org/tracker/CVE-2026-46300

😠

CVE-2026-46300

Linux kernel LPE ("fragnesia", CopyFail 3.0)

2026년 5월 공개된 'Fragnesia'는 Linux 커널의 XFRM ESP-in-TCP 서브시스템에서 발견된 새로운 로컬 권한 상승(LPE) 취약점입니다. 이 취약점은 Dirty Pipe와 유사한 페이지 캐시 쓰기 버그를 이용해 읽기 전용 파일의 커널 페이지 캐시를 임의로 수정할 수 있으며, race condition 없이 작동합니다. 공격자는 이를 통해 /usr/bin/su 바이너리의 메모리 내 내용을 변조해 루트 권한 쉘을 획득할 수 있습니다. 현재 패치는 netdev 메일링 리스트에 제출되었으나, 아직 메인라인 커널이나 안정화 버전에 포함되지 않았습니다. PoC 코드도 공개되어 있어 보안 업데이트가 시급합니다.

https://lwn.net/ml/all/8733zvfucm.fsf%40gentoo.org/

#linux #kernel #security #lpe #dirtypipe

[oss-security] Linux kernel LPE ("fragnesia", copyfail 3.0) [LWN.net]

Fragnesia Made Public As Latest Linux Local Privilege Escalation Vulnerability

Following last week's disclosure of the Dirty Frag vulnerability for the Linux kernel, which only finished being patched up in mainline on Monday, Fragnesia is now public as a similar local privilege escalation (LPE) vulnerability.