Hackerparagraph,IT-Security, Linux (Bild © DALL-E)
The [vulnerability][1] is widespread and affects all Linux kernel versions, including the latest Git state. As the vulnerability allows unauthorized reading of files owned by root, it poses a significant risk to the data integrity and confidentiality of the system.
The vulnerability was reported by Qualys and has since been fixed in the mainline Linux kernel. The developers have implemented a fix that specifically adjusts the ptrace behavior within the kernel to prevent unauthorized access.
Administrators and system users are urged to update to the latest patched kernel version to minimize the risk. Technical documentation and further analysis of the exploit and subsequent fix have been published in a public GitHub repository. [1]: https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
