|
|
Message-ID: <20260515022033.GA10889@localhost.localdomain> Date: Fri, 15 May 2026 02:20:48 +0000 From: Qualys Security Advisory <qsa@...lys.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: Logic bug in the Linux kernel's __ptrace_may_access() function Hi all, Today a vulnerability that we reported to security@...nel was fixed: https://github.com/torvalds/linux/commit/31e62c2ebbfdc3fe3dbdf5e02c92a9dc67087a3a Brad Spengler then published a brief analysis: https://x.com/spendergrsec/status/2054974174926430322 >From Altan Baig in that thread we learned that in 2020 Jann Horn had already proposed a patch for this issue: https://lore.kernel.org/all/20201016024019.1882062-1-jannh@google.com/ https://lore.kernel.org/all/20201016230915.1972840-1-jannh@google.com/ Later today two exploits for this vulnerability were published by _SiCk: https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn Today we also contacted the linux-distros@...nwall, but since exploits are already public we were told to send this to oss-security@...nwall instead, hence this post. We are not publishing our advisory yet, to give distributions and users a chance to patch. We are at your disposal for questions, comments, further discussions. Thank you very much! With best regards, -- the Qualys Security Advisory team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.