Overview
Description
Statistics
- 6 Posts
- 1 Interaction
Bluesky
Overview
Description
Statistics
- 5 Posts
- 8 Interactions
Fediverse
CVE-2026-46333: ‘ssh-keysign-pwn’ Linux Kernel Flaw Exposes SSH Keys and Shadow Passwords — Public PoC Released
#CyberSecurity
https://securebulletin.com/cve-2026-46333-ssh-keysign-pwn-linux-kernel-flaw-exposes-ssh-keys-and-shadow-passwords-public-poc-released/
#Ubuntu still doesn't have a patch or even a security notice for #sshkeysignpwn ...
How is this everyone else has been patched for days!
#Debian had a fix Friday morning...#DomumSocial is running on Debian, but in my day job I'm stuck with Ubuntu.
If you're also stuck with Ubuntu there is a mitigation:
`sudo sysctl -w kernel.yama.ptrace_scope=3`
I've tested this against the know exploit code at https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
This will disable the vulnerable ptrace call until the next reboot
Seeking confirmation of my theory I was able to find:
https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/
you can also set "yama.ptrace_scope" to "2" which will only allow root to use ptrace (and will also allow resetting it w/o reboot). The link above has more explanations and directions for setting it persistently across reboot for now.
This will break `strace` and `gdb`!
To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
Bluesky
Overview
Description
Statistics
- 5 Posts
- 1 Interaction
Fediverse
Bluesky
Overview
Description
Statistics
- 3 Posts
Fediverse
Bluesky
Overview
Description
Statistics
- 4 Posts
- 10 Interactions
Fediverse
Dirty Pipe→Copy Fail→Dirty Flag
---
Dirty Frag (CVE-2026-43284/43500) — Copy Failの暫定策が効かない理由と未パッチ期の管理者対応
https://zenn.dev/linuxmaster/articles/dirty-frag-cve-2026-43284-43500
#bookmarks
Ist die Aufregung um die neuen Linux-Fehler berechtigt?
Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:
CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").
Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).
Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher
#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen
#DirtyFrag #vulnerability: Universal Linux LPE
Obtains root privileges on major Linux distributions by chaining the xfrm-ESP Page-Cache Write (CVE-2026-43284) vulnerability and the RxRPC Page-Cache Write (CVE-2026-43500) vulnerability.
To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
Overview
Description
Statistics
- 3 Posts
- 9 Interactions
Fediverse
Ist die Aufregung um die neuen Linux-Fehler berechtigt?
Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:
CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").
Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).
Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher
#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen
#DirtyFrag #vulnerability: Universal Linux LPE
Obtains root privileges on major Linux distributions by chaining the xfrm-ESP Page-Cache Write (CVE-2026-43284) vulnerability and the RxRPC Page-Cache Write (CVE-2026-43500) vulnerability.
To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
Overview
- pallets
- werkzeug
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
How not to handle reported security issues: https://defnull.de/2024/CVE-2024-49767_flask/#timeline
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
多くの脆弱性対応含む。CVE-2026-6479の謝辞に "Claude and Anthropic Research" の記述があるが、これってClaude Mythosだったりするんかな。
---
PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 Released!
https://www.postgresql.org/about/news/postgresql-184-1710-1614-1518-and-1423-released-3297/
#bookmarks
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Overview
Description
Statistics
- 1 Post
- 1 Interaction