鈴猫
101.8K posts

鈴猫
@RinCatX
🔑 GPG 0xD58121A0080C2DE8 🎀 Avatar @tofumentalzabut | OC @ulenardis @mano_sukey 🖼️ Header @mozukun43 🎨 #鈴猫絵 #RinCatArt 🟩 https://t.co/l1AdBQvNUh
猫布団 Katılım Haziran 2009
1.5K Takip Edilen1.2K Takipçiler
鈴猫 retweetledi

1/ We are sharing additional details regarding our investigation into unauthorized access to GitHub's internal repositories.
Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension. We removed the malicious extension version, isolated the endpoint, and began incident response immediately.
English
鈴猫 retweetledi
鈴猫 retweetledi
鈴猫 retweetledi
鈴猫 retweetledi
鈴猫 retweetledi
鈴猫 retweetledi
鈴猫 retweetledi
鈴猫 retweetledi
鈴猫 retweetledi
鈴猫 retweetledi
鈴猫 retweetledi

🚨 Critical Linux Kernel Vulnerability Alert
Qualys has disclosed ssh-keysign-pwn: a 6-year race condition in __ptrace_may_access() that lets unprivileged local users read root-owned files.
A privileged process (e.g. ssh-keysign or chage) opens sensitive FDs. During do_exit(), after exit_mm() (mm=NULL) but before exit_files(), pidfd_getfd() can steal those FDs.
Impact: • Theft of host SSH private keys → real impersonation & MitM risk until keys are rotated
• Full read access to /etc/shadow → offline password cracking
Affected: All kernels before 31e62c2ebbfd (May 14, 2026) — Ubuntu, Debian, Arch, CentOS, Raspberry Pi OS and more.
Immediate action required: Apply the kernel patch NOW.
🔗 PoC: github.com/0xdeadbeefnetw…
🔗 Patch: git.kernel.org…/31e62c2ebbfd
🔗 Full analysis: Phoronix & Qualys oss-security
#LinuxSecurity #KernelVulnerability #CyberSecurity #InfoSec #OpenSSH #PrivilegeEscalation #ThreatIntelligence #Linux #CyberThreat #PatchNow
English
鈴猫 retweetledi

today we are releasing a qemu escape
V12@v12sec
0e11c4aa285dffe95d2d7e90d974ad0e72336549b0dd2161dec606ba4955e2e1 qemu.c
English























