Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20260515022033.GA10889@localhost.localdomain>
Date: Fri, 15 May 2026 02:20:48 +0000
From: Qualys Security Advisory <qsa@...lys.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: Logic bug in the Linux kernel's __ptrace_may_access() function

Hi all,

Today a vulnerability that we reported to security@...nel was fixed:

  https://github.com/torvalds/linux/commit/31e62c2ebbfdc3fe3dbdf5e02c92a9dc67087a3a

Brad Spengler then published a brief analysis:

  https://x.com/spendergrsec/status/2054974174926430322

>From Altan Baig in that thread we learned that in 2020 Jann Horn had
already proposed a patch for this issue:

  https://lore.kernel.org/all/20201016024019.1882062-1-jannh@google.com/
  https://lore.kernel.org/all/20201016230915.1972840-1-jannh@google.com/

Later today two exploits for this vulnerability were published by _SiCk:

  https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn

Today we also contacted the linux-distros@...nwall, but since exploits
are already public we were told to send this to oss-security@...nwall
instead, hence this post. We are not publishing our advisory yet, to
give distributions and users a chance to patch.

We are at your disposal for questions, comments, further discussions.
Thank you very much! With best regards,

-- 
the Qualys Security Advisory team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.