Linux kernel flaw “ssh-keysign-pwn” can expose SSH keys and shadow passwords


A newly disclosed Linux kernel vulnerability can let a low-privileged local user read sensitive root-owned files, including SSH host private keys and password hashes stored in /etc/shadow.

The flaw is tracked as CVE-2026-46333 and is widely known as “ssh-keysign-pwn,” after one of the public proof-of-concept exploits. It affects the kernel’s ptrace access-control logic during a short process shutdown window.

The vulnerability does not directly give attackers a root shell. However, the ability to read SSH host keys or password hashes can still create serious follow-on risk, especially on shared servers, hosting environments, and systems with local user access.

What CVE-2026-46333 does

CVE-2026-46333 affects the Linux kernel’s permission checks during process teardown. When a privileged process exits, the kernel releases its memory context before it closes all open file descriptors.

During that brief gap, the vulnerable ptrace access path can allow a local attacker to copy open file descriptors from the exiting privileged process. If that process opened a root-owned file, the attacker may gain a readable handle to it.

Public examples target ssh-keysign and chage. The ssh-keysign path can expose OpenSSH host private keys, while the chage path can expose /etc/shadow, which stores local password hashes.

ItemDetails
CVECVE-2026-46333
Nicknamessh-keysign-pwn
Bug classLocal information disclosure through process exit race
Affected componentLinux kernel ptrace access-control logic
Main impactRead access to sensitive root-owned files opened by privileged programs
Public PoCAvailable

Why SSH keys and /etc/shadow matter

OpenSSH host private keys identify a server to SSH clients. If attackers steal them, they may be able to support on-path attacks until administrators rotate the affected host keys.

The /etc/shadow file contains hashed local passwords. Attackers still need to crack those hashes before gaining plain-text passwords, but exposure gives them a starting point for offline attacks.

The risk grows when administrators reuse passwords or when host keys support automation, legacy trust relationships, or host-based authentication. In those cases, one exposed machine can create a wider security problem.

How the race condition works

The issue sits in __ptrace_may_access(), a kernel function that helps decide whether one process can inspect or interact with another process.

During normal shutdown, a process can briefly have no memory context while still holding open file descriptors. The vulnerable logic can skip an important dumpability check in this state.

Attackers can race that exit window and use pidfd_getfd to copy file descriptors from a privileged process. The known PoCs focus on privileged utilities that open sensitive files as part of normal behavior.

Which systems are affected?

Several Linux vendors have issued advisories or mitigation guidance. Ubuntu says its listed supported and extended releases are affected, while Red Hat says Red Hat Enterprise Linux 8, 9, and 10 are affected.

AlmaLinux confirmed that AlmaLinux 9 and 10 were vulnerable to the public exploits and shipped patched kernels. AlmaLinux also patched AlmaLinux 8 because the underlying logic bug exists there, even though the current public PoCs did not work reliably on that line.

CloudLinux said CloudLinux 8 LTS, 9, and 10 were affected by the public PoC, while CloudLinux 7 was not affected because its kernel predates the regression.

Vendor or platformStatus from vendor or public testing
UbuntuMultiple releases listed as affected, including 22.04 LTS, 24.04 LTS, and 26.04 LTS
Red Hat Enterprise LinuxRHEL 8, 9, and 10 listed as affected
AlmaLinuxAlmaLinux 9 and 10 vulnerable to public PoCs, with AlmaLinux 8 also patched
CloudLinuxCloudLinux 8 LTS, 9, and 10 affected by current public PoC
Public PoC testingReported against Ubuntu, Debian, Arch, CentOS 9, and Raspberry Pi OS Bookworm

Patch status and available mitigations

The upstream Linux fix landed on May 14, 2026, in commit 31e62c2ebbfd. Linux distributions are now shipping the fix through their normal kernel update channels.

Administrators should install the patched kernel package from their distribution and reboot into the updated kernel. Live patching may also be available in some enterprise environments.

Where a kernel update cannot happen immediately, vendors recommend tightening ptrace restrictions. Setting kernel.yama.ptrace_scope to 2 limits ptrace attach to users with CAP_SYS_PTRACE, while setting it to 3 disables ptrace attach more broadly.

  • Apply the latest kernel update from the Linux distribution vendor.
  • Reboot into the patched kernel after installation.
  • Use a trusted livepatch if the environment supports it.
  • Temporarily restrict ptrace access if patching cannot happen right away.
  • Review any workflows that rely on gdb, strace, or similar debugging tools before changing ptrace settings.

What administrators should do now

Security teams should treat this flaw as urgent on multi-user systems, shared hosting servers, developer workstations, and systems where untrusted users can run local commands.

The vulnerability requires local access, so internet-facing exposure alone does not mean attackers can exploit it directly. The risk increases if attackers already have a low-privileged shell through another vulnerability, stolen credentials, or a compromised account.

If administrators suspect exploitation, they should rotate SSH host keys and review authentication logs. They should also assess whether exposed password hashes could lead to account compromise.

  1. Identify all Linux systems that allow local user access.
  2. Patch and reboot the highest-risk servers first.
  3. Apply ptrace restrictions as a temporary mitigation where appropriate.
  4. Check whether SSH host keys may have been exposed.
  5. Rotate exposed or high-risk SSH host keys.
  6. Review /etc/shadow exposure risk and enforce strong password policies.
  7. Monitor for suspicious local process inspection activity.

Why this flaw is important even without root access

Many Linux security incidents depend on chaining several weaknesses together. A local information disclosure bug can become more damaging when combined with malware, weak passwords, reused credentials, or exposed developer accounts.

Stealing SSH host keys can also undermine trust in server identity. If clients trust those keys, attackers may have a stronger path for impersonation or on-path attacks until the keys change.

The safest approach is to patch quickly, reduce local attack surface, and treat any sensitive data that may have been exposed as potentially compromised.

FAQ

What is ssh-keysign-pwn?

ssh-keysign-pwn is the common name for CVE-2026-46333, a Linux kernel information disclosure flaw that can let a low-privileged local user read sensitive root-owned files through a process exit race.

Does CVE-2026-46333 give attackers root access?

No. The known impact is local information disclosure, not direct root access. However, exposed SSH host keys or /etc/shadow password hashes can help attackers launch follow-on attacks.

What files can the ssh-keysign-pwn exploit expose?

Public demonstrations show exposure of OpenSSH host private keys through ssh-keysign and /etc/shadow password hashes through chage. Other privileged programs with similar file handling patterns may also create risk.

How can Linux administrators fix CVE-2026-46333?

Administrators should install the patched kernel from their Linux distribution and reboot into it. If patching must be delayed, vendors recommend restricting ptrace access as a temporary mitigation.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages