ssh-keysign-pwn
Race condition in the Linux kernel process exit sequence allows unprivileged users to steal file descriptors from exiting privileged processes, enabling theft of SSH host keys and /etc/shadow.
Details
- Site
- https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
- Discovered by
- Qualys Security
- Introduced
- 5.6
- Fixed
- 31e62c2ebbfd
Timeline
- Jann Horn flags the general FD-theft shape via
pidfd_getfd[1] - Fix committed by Linus Torvalds[2]
- CVE-2026-46333 assigned, public disclosure[3]
Mitigation
No mitigation (other than upgrading your kernel) is known for this vulnerability.
Sources
- https://lore.kernel.org/all/20201016230915.1972840-1-jannh@google.com/
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=31e62c2ebbfd
- https://nvd.nist.gov/vuln/detail/CVE-2026-46333