Maple Grove Report

Maple Grove Report

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.


caution symbol

ismagilov/iStock/Getty Images Plus

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • Another day, another Linux bug. 
  • There is a patch out now.  
  • However, it’s not available yet in most distros. 

Linux’s latest kernel flaw doesn’t have a fancy name; it’s just called “ssh‑keysign‑pwn.” It’s the fourth high‑profile local security hole to hit Linux in just a few weeks. This one enables ordinary users to quietly read some of the most sensitive files on a system, including Secure Shell (SSH) host private keys and the shadow password file.

The vulnerability gets its “ssh‑keysign‑pwn” nickname from one of the main exploitation paths: abusing OpenSSH’s ssh-keysign helper binary. Keysign -keysign is used for host‑based authentication and typically runs setuid root, opening the system’s SSH host keys before dropping privileges to complete its work.

Also: The third major Linux kernel flaw in two weeks has been found – thanks to AI

Just what we needed. Another annoying and potentially dangerous Linux bug.

The flaw explained

Security researchers at security company Qualys disclosed CVE‑2026‑46333, an information‑disclosure vulnerability in the Linux kernel’s ptrace access check. Qualys claims it has existed in one form or another for about six years. 

The flaw sits in the __ptrace_may_access() logic that runs as processes exit. Under certain conditions, the kernel skips normal “dumpable” checks once a process has dropped its memory mapping. This opens a brief window for another process to steal its file descriptors.

While ssh‑keysign‑pwn doesn’t hand over a full root shell by itself, the ability to exfiltrate host keys and password hashes is a powerful building block for lateral movement and long‑term persistence. In addition, with stolen SSH host keys, attackers can impersonate machines in host‑based trust relationships. With access to the shadow password directory, they can attempt offline password cracking and reuse those credentials across systems.

Also: Linux is getting a security wake-up call – why it was inevitable, and I’m not worried

Just what we always needed. A persistent hack that can keep stealing keys and passwords. 

In his patch, Linus Torvalds explained the problem exists because “We have one odd special case: ptrace_may_access() uses ‘dumpable’ to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It’s not what this flag was designed for, but it is what it is.”

What that means for you and me is that by combining this logic error with the pidfd_getfd(2) system call, unprivileged users can reach into privileged processes that are in the middle of shutting down, grab their still‑open file descriptors, and then read from files that would normally be accessible only to root.

That wouldn’t be a big deal except that Qualys has shown via a proof‑of‑concept (PoC) exploit that the bug can be triggered reliably in practice, not just in theory. The good news is the fix is in. Linux stable maintainer Greg Kroah‑Hartman has already rolled out updates across multiple supported branches, including new releases such as 7.0.8, 6.18.31, 6.12.89, 6.6.139, 6.1.173, 5.15.207, and 5.10.256, all of which carry the ssh‑keysign‑pwn fix. 

What you need to do

You’ll want to move to one of these kernels ASAP. This hole affects all Linux kernels released before May 14, 2026. Otherwise, as one tired member of the Manjaro Linux team put it, “Don’t run your PC if you don’t need it. Lock yourself in and look over your shoulder.” Well, that’s certainly one way of dealing with it! 

Also: How to learn Claude Code for free with Anthropic’s AI courses

Until patched kernels are widely available, security teams do have some mitigation options, but each comes with trade‑offs. 

One quick and dirty workaround is to tighten Linux’s Yama ptrace restrictions by setting it with the command: 

sysctl kernel.yama.ptrace_scope=2. 

This disables ptrace for non‑root users and blocks the exploit, but it also breaks many debugging and monitoring workflows. This is not ideal for developer workflows. 

You can also reduce exposure by disabling host‑based SSH authentication and the ssh-keysign helper entirely on systems where they are not needed. This removes a primary avenue for stealing host keys. However, this also stops SSH in its tracks, which for many Linux systems is a non-starter.

Me? I’m going to be monitoring my systems and hoping the distros I use every day — Linux Mint, Ubuntu, AlmaLinux, openSUSE, and Rocky Linux — get patched by the end of the weekend. 





Source link


Over the next six weeks, Brockman said, Musk and the other cofounders had intense discussions about creating a for-profit entity to raise enough capital to build artificial general intelligence—powerful AI that can compete with humans on most cognitive tasks. Musk wanted to have majority equity in the entity and the right to choose a majority of the board members. He also wanted to be its CEO, said Brockman. 

Brockman testified that in August 2017, he and other cofounders gathered to hash out the terms of the for-profit structure. Ilya Sutskever, OpenAI’s chief scientist at the time, arrived bearing a painting of a Tesla as a “token of goodwill” in return for the actual Teslas Musk had given them days earlier. “It felt a little bit like [Musk] was buttering us up, right,that he wanted us to feel indebted to him,” Brockman told the jury.

When Brockman and Sutskever proposed that they all have equal shares of equity, said Brockman, Musk fell silent and finally said, “I decline.” Musk then stood up and “stormed around the table,” he said. “I actually thought he was going to hit me.” Musk grabbed the painting and walked out. 

Brockman said that afterwards he struggled to decide whether to continue building OpenAI with Musk or break away. “There was a fork in the road,” he said. “Do we accept Elon’s terms? Or do we reject the terms, he quits to create his own, and then we create our own?”

“The one thing we could not accept was to hand him unilateral, absolute control, potentially, over the AGI,” Brockman told the jury.

What was Brockman thinking?

In his theatrical baritone, Molo argued that Brockman was motivated by greed rather than a commitment to OpenAI’s nonprofit mission to develop AI that benefits humanity. He noted that while Brockman never invested money in the company, he now owns a stake worth close to $30 billion. 

“Solving for the mission has always been my primary motivation,” Brockman said, pushing back on Molo’s characterization of him. “It remains so today.” 



Source link

Recent Reviews