CVE-2026-46333: Linux Kernel Flaw Grants Root via ssh-keysign

Qualys disclosed CVE-2026-46333, a nine-year-old Linux privilege escalation flaw that gives local users a reliable path to root on Debian, Fedora, and Ubuntu.
Table of Contents
    Add a header to begin generating the table of contents

    A flaw hidden inside the Linux kernel’s ptrace access control mechanism since November 2016 gives any unprivileged local user a reliable, scriptable path to root — including direct access to SSH private keys and shadow passwords — on default installations of Debian, Fedora, and Ubuntu, Qualys Threat Research Unit disclosed on May 21, 2026. The vulnerability, CVE-2026-46333, carries the nickname “ssh-keysign-pwn” and has been present in production kernels for nine years.

    CVE-2026-46333 in the Linux Kernel’s __ptrace_may_access() Function

    The flaw resides in __ptrace_may_access(), the kernel function that determines whether one process can read or write another’s memory. A bug introduced in that function in November 2016 persisted undetected across kernel version series spanning three of the major enterprise Linux distributions and their default configurations. Qualys Threat Research Unit assigned the vulnerability a CVSS score of 5.5, categorizing it as Medium severity, but explicitly stated that the practical impact is significantly higher than that rating reflects.

    The attack requires only local access — no network exposure, no authentication to a remote service. That prerequisite narrows the theoretical attack surface, but local footholds are routinely achieved through web application exploitation, phishing-delivered malware, or compromised services. Any attacker who has gained a shell on an unpatched Debian, Fedora, or Ubuntu system through any of those vectors can immediately progress to full root access using CVE-2026-46333.

    chage, ssh-keysign, pkexec, and accounts-daemon as CVE-2026-46333 Attack Primitives

    Qualys identified four set-UID root binaries as reliable exploitation primitives: chage (password aging), ssh-keysign (SSH host-based authentication), pkexec (policy kit authorization), and accounts-daemon (user account management). Set-UID binaries run with root-level privileges regardless of which user invokes them, making their memory a high-value target for a ptrace-based inspection attack. Through the CVE-2026-46333 exploit path, a local user exploits the flawed ptrace access check to interrogate memory belonging to one of these processes, extracting root-accessible credential material: the contents of /etc/shadow containing hashed user passwords and in-memory SSH private keys held by ssh-keysign during host-based authentication operations.

    Qualys researchers characterized the exploit as “reliable,” stating that it “turns any local shell into a path to root or to sensitive credential material.” A reliable primitive is operationally distinct from race-condition-dependent privilege escalation flaws where repeated attempts or precise timing are required — CVE-2026-46333 executes deterministically and can be scripted for automated post-exploitation workflows.

    CVE-2026-46333’s Nine-Year Presence in Production Linux Kernels

    The flaw’s introduction in November 2016 means it traversed nearly a decade of kernel releases across the major enterprise Linux distributions without detection. Qualys noted this discovery fits a documented pattern of deep kernel vulnerabilities hiding in production for extended periods. The nine-year exposure window represents a period during which any attacker who independently discovered the same bug could have exploited it silently, though no evidence of prior exploitation was cited in the disclosure.

    The CVSS 5.5 score reflects the local-access requirement but does not account for the practical exploitation characteristics: the absence of race conditions, the deterministic path to root, and the exposure of both /etc/shadow shadow passwords and SSH private keys on the three largest enterprise Linux distribution families simultaneously. Debian, Fedora, and Ubuntu each maintain distinct kernel packaging pipelines, so distribution-specific patches are required from each vendor.

    Interim Workaround and Post-Exposure Steps for Debian, Fedora, and Ubuntu

    While distribution vendors prepare kernel patches, Qualys identified a viable interim mitigation: raising the kernel.yama.ptrace_scope kernel parameter to 2. At that value, ptrace-based memory inspection is restricted to parent-child process relationships only, blocking the attack path that relies on interrogating unrelated set-UID binaries. Administrators can apply this setting at runtime without requiring a reboot in most configurations.

    Organizations running Debian, Fedora, or Ubuntu should treat any system that was exposed before May 21 as potentially compromised. Qualys recommended rotating SSH host keys to invalidate any private key material that may have been extracted through the flaw, and auditing set-UID process memory for cached administrative credentials. The nine-year presence of CVE-2026-46333 in production kernels means retrospective detection of silent exploitation is difficult — systems that were compromised before public disclosure would leave minimal forensic trace beyond access log anomalies tied to the exposed credential material.

    Related Posts