Loading...
Loading...
A critical Linux kernel local privilege escalation vulnerability dubbed ssh-keysign-pwn, disclosed May 14, 2026, has been traced to a commit dating back to at least 2020. The bug in __ptrace_may_access() can bypass dumpable checks when task->mm is NULL during process exit, letting an unprivileged local user with the same UID steal open file descriptors from privileged processes. Exploits can recover SSH host private keys and /etc/shadow hashes; proof‑of‑concepts target ssh-keysign and chage. Linus Torvalds issued patches and admins must apply kernel updates immediately. Researchers also used AI code review to help identify the subtle, long‑standing commit error.
This vulnerability allows local attackers to steal SSH host keys and /etc/shadow data from privileged processes, undermining server trust and user credentials. Tech professionals must prioritize kernel updates and audit systems for key compromise and unauthorized local access.
Dossier last updated: 2026-05-21 06:26:44
Cyberkendra and Qualys TRU disclosed CVE-2026-46333, a high-severity Linux kernel vulnerability in __ptrace_may_access() that has existed in mainline for nearly nine years. Local low-privilege attackers can exploit a race during privileged processes' temporary drop in privileges, combined with pidfd_getfd(), to steal open file descriptors and execute commands as root. Qualys published PoCs targeting chage, ssh-keysign, pkexec and accounts-daemon and validated exploits on Debian 13, Ubuntu 24.04/26.04 and Fedora 43/44, including theft of SSH host private keys. Linus Torvalds committed the upstream fix (commit 31e62c2ebbfd) and major distributions — Debian, Fedora, Red Hat, SUSE, AlmaLinux, CloudLinux — have backported patches. The bug underscores urgent patching needs across Linux deployments.
Logic bug in the Linux kernel's __ptrace_may_access() function (CVE-2026-46333)
Qualys disclosed on May 14, 2026 a critical Linux kernel local privilege escalation flaw named ssh-keysign-pwn that dates back at least to 2020. The bug in __ptrace_may_access() can skip dumpable checks when task->mm == NULL during a brief window as a process exits, allowing an unprivileged local user with the same UID to steal open file descriptors from high-privilege processes. Exploits can read SSH host private keys or /etc/shadow hashes; PoCs provided target ssh-keysign and chage. The issue affects all stable Linux kernels and distributions including Arch, Debian, Ubuntu, CentOS and Raspberry Pi OS. Linus Torvalds released patches on May 14; admins should apply kernel updates immediately to prevent key and credential theft.
@silsrc: 今天有点时间了,于是尝试了一下让几个顶尖的 AI Review 这个几年前有问题的 Linux 内核 commit,看看能不能找出问题。因为这个问题是我“瞪眼法”顺路看出来的,一路大佬排查了很久也没查出来,而且我排查修复全过程应该都被收录到