惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

The Register - Security
The Register - Security
美团技术团队
Recent Announcements
Recent Announcements
MongoDB | Blog
MongoDB | Blog
Jina AI
Jina AI
C
Check Point Blog
aimingoo的专栏
aimingoo的专栏
I
InfoQ
S
Securelist
T
Tor Project blog
GbyAI
GbyAI
L
LINUX DO - 热门话题
V
Visual Studio Blog
AWS News Blog
AWS News Blog
The Cloudflare Blog
腾讯CDC
K
Kaspersky official blog
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
Recorded Future
Recorded Future
李成银的技术随笔
W
WeLiveSecurity
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
M
Microsoft Research Blog - Microsoft Research
G
Google Developers Blog
酷 壳 – CoolShell
酷 壳 – CoolShell
Schneier on Security
Schneier on Security
B
Blog
IT之家
IT之家
爱范儿
爱范儿
H
Help Net Security
Simon Willison's Weblog
Simon Willison's Weblog
NISL@THU
NISL@THU
J
Java Code Geeks
博客园 - 聂微东
T
The Exploit Database - CXSecurity.com
Cyberwarzone
Cyberwarzone
博客园 - 叶小钗
MyScale Blog
MyScale Blog
Application and Cybersecurity Blog
Application and Cybersecurity Blog
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
Project Zero
Project Zero
F
Future of Privacy Forum
D
Darknet – Hacking Tools, Hacker News & Cyber Security
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events
Hacker News: Ask HN
Hacker News: Ask HN
D
Docker
Apple Machine Learning Research
Apple Machine Learning Research
B
Blog RSS Feed
V
Vulnerabilities – Threatpost

www.infosecurity-magazine.com

Grafana Labs Says Code Breach Stemmed from TanStack Attack Android Malware Campaign Used Hundreds of Fake Apps to Silently Charge Users Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem China-Linked Webworm APT Evolves Tactics, Expands to European Targets GitHub Confirms Breach of Internal Repositories Via Malicious VS Code Extension Researchers Warn CypherLoc Scareware Has Targeted Millions of Users Verizon DBIR: Vulnerability Exploits Overtake Credentials as Top Access Vector Microsoft Takes Down Fox Tempest for Providing Ransomware-Enabling Signing Tool AI Raises the Bar on Vulnerability Awareness and Secure-by-Design Software Agentic AI Accelerates Software Builds and Mobile App Attacks Grafana Labs Confirms Hackers Stole Source Code Hackers Bypass Security Tools to Target Users Directly Interpol Launches Sweeping Cybercrime Crackdown in MENA Region The Infosecurity Europe Cyber Startup Competition: Meet the Finalists NCSC Publishes Guidance on Securing Agentic AI Use Security Researchers Find 47 Zero-Days at Pwn2Own Berlin Bank of England, FCA and Treasury Raise Alarm Over Frontier AI Gremlin Stealer Evolves into Modular Threat with Advanced Evasion Capabilities Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer Mustang Panda Linked to Updated FDMTP Backdoor in Asia-Pacific Espionage Campaign Google Launches Android Spyware Forensics Tool for High-Risk Users New Fragnesia Flaw Hands Linux Local Users Root Access Most Organizations Now Use AI Agents for Sensitive Security Tasks ICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks Canvas Owner Reaches Agreement With Cybercriminals After Ransomware Attack Avada Builder Flaws Expose One Million WordPress Sites Ransomware: Over Half of CISOs Would Consider Paying Ransom to Hackers Global Cyber Agencies Issue New SBOMs for AI Guidance to Tackle AI Supply Chain Risks UK Cybersecurity Market Expands to £14.7bn with Strong Growth in AI Security Firms Microsoft Fixes 17 Critical Flaws in May Patch Tuesday OpenAI Launches 'Daybreak' to Help Build Secure By Design Software Mini Shai-Hulud Hits TanStack npm Packages End‑to‑End Encrypted RCS Messaging Arrives Across iPhone and Android Attackers Combine ClickFix With PySoxy Proxying to Maintain Persistence Malicious Hugging Face Repository Typosquats OpenAI South Staffordshire Water Fined £1m After Data Breach TrickMo Variant Routes Android Trojan Traffic Through TON Rushed Patches Follow Broken Embargo on New Linux Kernel Vulnerabilities Fake Claude Code Page Pushes PowerShell Stealer at Devs Hackers Observed Using AI to Develop Zero-Day for the First Time US: FCC Relaxes Foreign-Made Router Ban to Allow for Security Updates ShinyHunters Escalates Canvas Extortion with School by School Ransom Campaign Zara Data Breach Impacts Nearly 200,000 Customers Police Shut Relaunched Crimenetwork Dark Web Marketplace Australian Cyber Security Centre Issues Alert Over ClickFix Attacks PCPJack Campaign Boots TeamPCP Off Compromised Machines Legacy Security Tools Are Failing Data Protection, Capital One Software Report Finds Cline Kanban Flaw Lets Websites Hijack AI Coding Agents OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack, Warns Dragos Fake Claude AI Site Drops Beagle Backdoor on Windows Users Daemon Tools Developer Confirms Software Was Trojanized Researchers Spot Uptick in Use of Vercel for Phishing Campaigns CloudZ Malware Abuses Phone Link to Steal SMS OTPs CISA Urges Critical Infrastructure Providers to Make Plans to Remain Operational if hit by Cyber-Attack Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign One in Eight Workers Has Sold Their Corporate Logins Microsoft Flags Mass Phishing Campaign Using Fake Compliance Emails North Korean APT Targets Yanbian Gamers via Trojanized Platform Fake SSA Emails Drive Venomous#Helper Phishing Campaign AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed to Cyber Risk NCSC Warns of an AI-Fuelled “Vulnerability Patch Wave” Trellix Reveals Unauthorized Access to Source Code Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says OpenAI To Extend Cyber Program to Government Agencies Anthropic Rolls Out Claude Security for AI Vulnerability Scanning Two American Cybersecurity Workers Jailed for BlackCat Ransomware Attacks Nine-Year-Old Zero-Day Flaw in Linux Kernel Discovered by AI-Equipped Security Researcher Three Arrested for Hacking Over 610,000 Roblox Accounts Deep#Door Python Backdoor Evades Detection On Windows CISA and Partners Publish Zero Trust Guidance For OT Security UK: Education Sector Faces Surge in Cyber Breaches Despite Stable National Threat Levels Europol Busts Albanian Scam Call Centers in Major Online Fraud Case Cyber is the Number One Global “People Risk,” Says Marsh Cursor Extension Flaw Exposes Developer API Keys Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto Wallets Researchers Track 2.9 Billion Compromised Credentials Critical Flaw Turns Vect Ransomware into Data Destroying Wiper A Quarter of Healthcare Organizations Report Medical Device Cyber-Attacks Medtronic Confirms Data Breach After ShinyHunters Claims Ransomware Turf War as 0APT and KryBit Groups Trade Blows Chinese National Extradited Over Silk Typhoon Cyber Campaign No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC North Korean Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures US Sanctions Target Cambodian Scam Network Leaders Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected Widely Used Browser Extensions Selling User Data Most Cybersecurity Professionals Feel Undervalued and Underpaid Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet BlackFile Group Targets Retail and Hospitality with Vishing Attacks UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation Google Favors General‑Purpose Gemini Models Over Cybersecurity‑Specific AI Apple Fixes iOS Notification Bug Exposing Deleted Messages Google Introduces Unique AI Agent Identities in New Gemini Enterprise Platform Cyber-Attacks Surge 63% Annually in Education Sector Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents NCSC Backs Passkeys, Hailing a New Era of Sign-in MacOS Native Tools Enable Stealthy Enterprise Attacks
Nine-Year-Old Linux Kernel Flaw Leaks SSH Keys and Password Hashes
2026-05-21 · via www.infosecurity-magazine.com

A nine-year-old logic flaw in the Linux kernel's process trace (ptrace) path has been discovered that could let unprivileged local users read sensitive files, including secure shell host (SSH) private keys and the system password hash, on default installations of Debian, Fedora and Ubuntu.

According to new analysis from the Qualys Threat Research Unit (TRU), the vulnerability, tracked as CVE-2026-46333, has been present in mainline Linux since November 2016. Upstream patches and distribution updates are available, and working exploits are circulating publicly.

The flaw is the fourth Linux kernel local security issue disclosed in three weeks, following Copy Fail, Dirty Frag and Fragnesia.

A Race in the Credential Drop

The bug sits in the kernel's __ptrace_may_access() function. Qualys identified a narrow window in which a privileged process that is dropping its credentials remains reachable through ptrace operations, even though its dumpable flag should have closed that path.

By pairing this window with the pidfd_getfd() syscall, an attacker can capture file descriptors from a setuid binary mid-exit and inherit its access to the underlying files. pidfd_getfd() was added to the kernel in January 2020, which broadened the practical reach of the older flaw.

The proof-of-concept (PoC) developed by Qualys targets ssh-keysign, a setuid binary that briefly holds SSH host private keys open during authentication signing. A second variant targets chage, stealing the open handle to /etc/shadow and exposing every user's password hash on the host.

Read more on Linux kernel LPE flaws: New Fragnesia Flaw Hands Linux Local Users Root Access

The Qualys TRU also developed working exploits against pkexec and accounts-daemon, withholding all four publicly during the coordinated disclosure window.

Saeed Abbasi, senior manager at the Qualys TRU, said the technique "turns any local shell into a path to root or to sensitive credential material."

Impact, Risk Profile and Mitigation

The four exploits Qualys developed span a range of impacts. The chage and ssh-keysign exploits yield information disclosure, while pkexec and accounts-daemon let the attacker execute arbitrary commands as root.

CVSS rated the bug 5.5, but Qualys argued the distinction between an unprivileged foothold and full host compromise collapses in practice, because the disclosed files alone are enough to take over the system.

The risk profile is sharpest in environments where unprivileged shells are routinely available to untrusted parties, including shared hosting and multi-tenant CI runners.

Administrators should apply the vendor kernel update for their distribution without delay. As an interim mitigation, Ubuntu and Qualys both recommend raising kernel.yama.ptrace_scope to 2 via sysctl, which gates ptrace attachment behind CAP_SYS_PTRACE and blocks the public exploit path at the cost of breaking unprivileged debugging workflows.