Ohne neue Linux-Root-Lücke wegen der das RZ die Häflte der Server abstellt, ist es inzwischen ja sonst auch gar kein richtiges Wochenende mehr.

#sshkeysignpwn

Nous avons décidé d'appliquer (sur les Debian 7 à 13) le patch qui configure le sysctl "kernel.yama.ptrace_scope=2", en utilisant Ansible avec cette tâche : https://paste.evolix.org/?76d737e7693e2fd2#DQW289rJrW9dSggs6K92J7Jmm4u5j13G9ycEsAKrrsJm #sshkeysignpwn #linux #debian #cybersecurity
PrivateBin

Visit this link to see the note. Giving the URL to anyone allows them to access the note, too.

PrivateBin
C’était sans compter une nouvelle faille dans le noyau Linux 😥 #sshkeysignpwn

"Logic bug in the Linux kernel's __ptrace_may_access() function"
👇
https://www.openwall.com/lists/oss-security/2026/05/15/2

#CyberVeille #sshkeysignpwn

oss-security - Logic bug in the Linux kernel's __ptrace_may_access() function

Newest Linux kernel vulnerability mitigation:
# echo 2 > /proc/sys/kernel/yama/ptrace_scope
# echo 'kernel.yama.ptrace_scope=2' > /etc/sysctl.d/ssh-keysign-pwn.conf

On all deb systems you can install linux-vulnerability-mitigation from https://people.debian.org/~daniel/linux-vulnerability-mitigation/

Source: https://forgejo.debian.net/linux/linux-vulnerability-mitigation/src/branch/main/mitigations

#Linux #debian #Ubuntu #kernel #security #mitigation #sshkeysignpwn

Index of /~daniel/linux-vulnerability-mitigation

Linux's Latest Vulnerability Allows Reading Root-Owned Files By Unprivileged Users

Following Dirty Frag, Fragnesia, and other Linux kernel vulnerabilities making themselves known in recent days, the latest now is ssh-keysign-pwn.

⚠️ 🤪 🔥  
Nouvelle vuln kernel Linux aujourd'hui : ssh-keysign-pwn 🔑

Pas une LPE cette fois, mais lecture de fichiers root en user non-privilégié :
• Clés privées SSH host (ecdsa/ed25519/rsa)
• /etc/shadow → crack offline

Le bug : ptrace_may_access() saute le check dumpable quand mm=NULL. Race window entre exit_mm() et exit_files(). Flaggé par Jann Horn en 2020... corrigé en 2026. 6 ans.

Confirmé sur : Debian 13, Ubuntu 22/24/26, Arch, CentOS, RPi OS. Pas de prérequis CONFIG spécifique donc cela semblerait bien plus universel que Fragnesia.

Patch mergé dans mainline par Linus aujourd'hui (31e62c2ebbfd), pas encore dans les kernels stables.
Pas de CVE assigné à ce stade.
👇
https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn

"Six-Year-Old Linux Kernel Flaw Lets Unprivileged Users Read Root-Owned Files
"
⬇️
https://9to5linux.com/six-year-old-linux-kernel-flaw-lets-unprivileged-users-read-root-owned-files

#cyberVeille #Linux #sshkeysignpwn

GitHub - 0xdeadbeefnetwork/ssh-keysign-pwn: Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels.

Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels. - 0xdeadbeefnetwork/ssh-keysign-pwn

GitHub

Oh no, please don't tell me again that Linux is now insecure on the net?!

«Linux's Latest Vulnerability Allows Reading Root-Owned Files By Unprivileged Users»

⛓️‍💥 https://www.phoronix.com/news/Linux-ssh-keysign-pwn
⛓️‍💥 https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn

#sshkeysignpwn #pwn #ssh #linux #0day #keysigning #sshkeys #itsecurity #itsec #itsecurity #zeroday

Linux's Latest Vulnerability Allows Reading Root-Owned Files By Unprivileged Users

Following Dirty Frag, Fragnesia, and other Linux kernel vulnerabilities making themselves known in recent days, the latest now is ssh-keysign-pwn.