Debian, Ubuntu and Raspberry Pi OS: Critical Linux Kernel Flaw ‘ssh-keysign-pwn’ Exposes SSH Keys and Shadow Passwords

Debian, Ubuntu and Raspberry Pi OS: Critical Linux Kernel Flaw ‘ssh-keysign-pwn’ Exposes SSH Keys and Shadow Passwords

Critical Linux Kernel Flaw Exposes SSH Keys and Password Hashes

A newly disclosed Linux kernel vulnerability, tracked as CVE-2026-46333 and dubbed "ssh-keysign-pwn," allows attackers to extract highly sensitive data including SSH private keys and password hashes from affected systems. The flaw stems from a race condition in the kernel’s ptrace access control logic, specifically within the __ptrace_may_access() function.

How the Exploit Works

The vulnerability arises when a privileged process (e.g., ssh-keysign or chage) shuts down. During this brief window, its memory context is cleared (mm = NULL), but its file descriptors remain open. An unprivileged local attacker can exploit this gap using pidfd_getfd() to steal these descriptors, bypassing intended permission checks.

A proof-of-concept (PoC) exploit on GitHub demonstrates how attackers can repeatedly spawn processes to race against a privileged helper’s exit, successfully extracting file descriptors in 100–2000 attempts making it a practical threat.

Impact & Risks

  • SSH Private Key Theft: Enables attackers to impersonate systems or users, conduct man-in-the-middle (MitM) attacks, and move laterally across networks.
  • Password Hash Exposure: Full read access to /etc/shadow, allowing offline cracking of credentials.
  • Cascading Compromises: Since SSH keys are often reused, a single breach can lead to wider network access.

Affected Systems

The flaw impacts most Linux distributions running kernels before the May 14, 2026 patch, including:

  • Ubuntu
  • Debian
  • Arch Linux
  • CentOS
  • Raspberry Pi OS

Given the vulnerability’s six-year existence, many long-term deployments remain exposed.

Mitigation & Response

  • Apply kernel patches for CVE-2026-46333.
  • Rotate all SSH keys, particularly on critical systems.
  • Audit access to sensitive files like /etc/shadow.
  • Monitor for suspicious ptrace or pidfd system calls.
  • Restrict local user access where possible, as exploitation requires local presence.

With a public PoC exploit already available, the risk of active exploitation in the wild is heightened, underscoring the urgency for remediation.

Source: https://cybersecuritynews.com/linux-kernel-vulnerability-ssh-keysign-pwn/

Ubuntu cybersecurity rating report: https://www.rankiteo.com/company/ubuntu-linux

Raspberry Pi cybersecurity rating report: https://www.rankiteo.com/company/raspberrypi

Debian cybersecurity rating report: https://www.rankiteo.com/company/debian

"id": "UBURASDEB1778919975",
"linkid": "ubuntu-linux, raspberrypi, debian",
"type": "Vulnerability",
"date": "5/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': 'Technology/Software',
                        'location': 'Global',
                        'name': 'Ubuntu',
                        'type': 'Operating System'},
                       {'industry': 'Technology/Software',
                        'location': 'Global',
                        'name': 'Debian',
                        'type': 'Operating System'},
                       {'industry': 'Technology/Software',
                        'location': 'Global',
                        'name': 'Arch Linux',
                        'type': 'Operating System'},
                       {'industry': 'Technology/Software',
                        'location': 'Global',
                        'name': 'CentOS',
                        'type': 'Operating System'},
                       {'industry': 'Technology/Embedded Systems',
                        'location': 'Global',
                        'name': 'Raspberry Pi OS',
                        'type': 'Operating System'}],
 'attack_vector': 'Local',
 'data_breach': {'file_types_exposed': ['/etc/shadow'],
                 'sensitivity_of_data': 'High (SSH keys, password hashes)',
                 'type_of_data_compromised': ['SSH private keys',
                                              'Password hashes']},
 'description': 'A newly disclosed Linux kernel vulnerability, tracked as '
                "CVE-2026-46333 and dubbed 'ssh-keysign-pwn,' allows attackers "
                'to extract highly sensitive data including SSH private keys '
                'and password hashes from affected systems. The flaw stems '
                'from a race condition in the kernel’s ptrace access control '
                'logic, specifically within the __ptrace_may_access() '
                'function. The vulnerability arises when a privileged process '
                'shuts down, leaving its file descriptors open and exploitable '
                'via pidfd_getfd().',
 'impact': {'data_compromised': 'SSH private keys, password hashes '
                                '(/etc/shadow)',
            'identity_theft_risk': 'High (SSH key impersonation, password '
                                   'cracking)',
            'operational_impact': 'Lateral movement, man-in-the-middle '
                                  'attacks, credential cracking',
            'systems_affected': 'Linux systems running kernels before May 14, '
                                '2026 patch'},
 'lessons_learned': 'Race conditions in privileged process shutdowns can lead '
                    'to severe security breaches. Timely patching and key '
                    'rotation are critical for mitigating such '
                    'vulnerabilities.',
 'post_incident_analysis': {'corrective_actions': 'Kernel patching, access '
                                                  'control hardening, '
                                                  'monitoring for exploitation '
                                                  'attempts',
                            'root_causes': 'Race condition in '
                                           '__ptrace_may_access() function '
                                           'during privileged process '
                                           'shutdown'},
 'recommendations': ['Apply kernel patches immediately',
                     'Rotate all SSH keys on affected systems',
                     'Audit and restrict access to sensitive files',
                     'Monitor for anomalous ptrace/pidfd activity',
                     'Implement least-privilege access controls'],
 'references': [{'source': 'GitHub PoC Exploit'}],
 'response': {'containment_measures': ['Apply kernel patches for '
                                       'CVE-2026-46333',
                                       'Rotate all SSH keys',
                                       'Audit access to sensitive files like '
                                       '/etc/shadow',
                                       'Monitor for suspicious ptrace or pidfd '
                                       'system calls',
                                       'Restrict local user access where '
                                       'possible'],
              'enhanced_monitoring': 'Monitor for suspicious ptrace or pidfd '
                                     'system calls',
              'remediation_measures': 'Kernel patching, SSH key rotation, '
                                      'access audits'},
 'title': 'Critical Linux Kernel Flaw Exposes SSH Keys and Password Hashes '
          '(CVE-2026-46333)',
 'type': 'Privilege Escalation',
 'vulnerability_exploited': 'CVE-2026-46333 (Race condition in '
                            '__ptrace_may_access())'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.