GitHub - 0xdeadbeefnetwork/ssh-keysign-pwn: Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels.

Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels. - 0xdeadbeefnetwork/ssh-keysign-pwn

GitHub

@cadey god, kill me

I’m trying to find mitigations somewhere or if it’s just kernel update time (again)

@tyler it's kernel update time once patches percolate out
@cadey y’all got any of those precedented times we could have for a bit because I’m tired, boss

@tyler @cadey

I sure hope there's a finite set of severe vulnerabilities.

@cadey @tyler read right to left
@brettowe @cadey it’s turtles putting up under_construction.gif pages all the way down
@tyler Setting sysctl kernel.yama.ptrace_scope=2 (or 3) seems to work. [EDIT: This is insufficient; see thread.]
@jrenken dang dude you’re the GOAT, thank you for this, first mitigation I’ve seen
@tyler Unfortunate update: A Gentoo dev, who knows better than me, says the vuln is not exclusive to ptrace. So, my sysctl workaround only breaks that one public proof-of-concept exploit, not others. https://www.openwall.com/lists/oss-security/2026/05/15/3
oss-security - Re: Logic bug in the Linux kernel's __ptrace_may_access() function

@jrenken @tyler @thesamesam has been like awake for a week straight finding fixes for these I swear

@jrenken @tyler A different post in that oss-security thread backs the claim that setting yama.ptrace_scope=[23] is sufficient (for now): https://www.openwall.com/lists/oss-security/2026/05/15/10

@cadey

oss-security - Re: Logic bug in the Linux kernel's __ptrace_may_access() function

@jrenken @tyler @cadey There's also an update by the Gentoo dev in https://www.openwall.com/lists/oss-security/2026/05/15/11, saying "What I got mixed up with was that in Gentoo, for some reasons I won't bore readers with, =2 and =3 aren't an option yet [..]", so that's currently a Gentoo-specific limitation.
oss-security - Re: Logic bug in the Linux kernel's __ptrace_may_access() function

@jrenken @tyler does this require the system to have the Yama LSM enabled? Is that common?
@e_nomem @tyler Yes. I think so: it seems to be enabled by default in Debian & Ubuntu. But it turns out this isn't a sufficient workaround; see thread.
@jrenken @tyler better than nothing until the patches are out 🤷‍♂️
Chapter 4. Common kernel-related tasks

@e_nomem @tyler And by "just" I mean "just now," not "simply." 😭
@jrenken @tyler The debian kernel images with the patches are up
@cadey 
"Reported by Qualys, fixed by Linus 2026-05-14. Jann Horn flagged the FD-theft shape in October 2020. Six years"
@cadey My dedicated "SSH off button" is looking tasty
@babble_endanger @cadey Luckily it's not that bad. They need access to your machine before they can own it.

@cadey

Is responsible disclosure just not a thing any more, or what? Why is every f**king thing a 0-day all of a sudden?

Edit: Apparently it's because commits are being monitored by LLMs and rapidly turned into working exploits, so all #Linux vulnerabilities are 0-days from now on. Wonderful. https://lobste.rs/s/wskhre

#security

ssh-keysign-pwn: Read root-owned files as an unprivileged user

0 comments

Lobsters

@argv_minus_one @cadey ‘Responsible disclosure’ was a brief attempt at language engineering by Microsoft which was largely abandoned 15-20 years ago.

Turns out that finger-pointing during a crisis is almost never helpful or appreciated.

@argv_minus_one @cadey Next step is to say humans can't keep up so they need to let AI in. Create your own demand

@maryjane

Nah, the vulnerability only became known when the patch was committed. Fixing the bug isn't the problem. Distributing the fix is the problem, and I don't see how AI can help with that.

@cadey

@argv_minus_one @maryjane @cadey let the AI on the system so it can install the fix in the minute it gets released.

⚠️ Don't do that! ⚠️
But it seems like there could be someone pushing this idea.

@argv_minus_one

Well to be nice on that case, then let the thingy run loose on devs branches to check PR before merged...

Likely some issues in implementing depending on projects workflows etc. But if you actually want to use it to improve security, then use it to catch stuff before merge.

@cadey

@cadey Does anyone better at LKML-reading than me know why the patches from Jann Horn weren't merged? Just never got fully reviewed or something?
[RFC PATCH resend 0/6] mm and ptrace: Track dumpability until task is freed - Jann Horn

@cadey

"Ah shit, here we go again…"

#linux #lpe #0day

@cadey
Why is it ALWAYS on a friday morning?
@cadey how bad is it ? I see nothing in tech news :/
@cadey Nice, no hits on Ubuntu 18.04.6 .
@cadey maybe they fired the person at the NSA in charge of keeping track of backdoor, so they release them one at a time