-
CVE-2026-46333
- EPSS 0.02%
- Veröffentlicht 15.05.2026 12:58:44
- Zuletzt bearbeitet 16.05.2026 13:16:16
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
ptrace: slightly saner 'get_dumpable()' logic
In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointer. But we have one odd special case: ptrace_may_access() uses 'dumpable' to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It's not what this flag was designed for, but it is what it is. The ptrace code does check that the uid/gid matches, so you do have to be uid-0 to see kernel thread details, but this means that the traditional "drop capabilities" model doesn't make any difference for this all. Make it all make a *bit* more sense by saying that if you don't have a MM pointer, we'll use a cached "last dumpability" flag if the thread ever had a MM (it will be zero for kernel threads since it is never set), and require a proper CAP_SYS_PTRACE capability to override.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
93d4ba49d18e3d7fb41a9927c2d0cca5e9dfefd6
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
15b828a46f305ae9f05a7c16914b3ce273474205
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
4709234fd1b95136ceb789f639b1e7ea5de1b181
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
8f907d345bae8f4b3f004c5abc56bf2dfb851ea7
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
6e5b51e74a40d377bcd3081dd33fbaa0e1aa7e3d
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
2a93a4fac7b6051d3be7cd1b015fe7320cd0404d
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
01363cb3fbd0238ffdeb09f53e9039c9edf8a730
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version <=
5.10.*
Version
5.10.256
Status
unaffected
Version <=
5.15.*
Version
5.15.207
Status
unaffected
Version <=
6.1.*
Version
6.1.173
Status
unaffected
Version <=
6.6.*
Version
6.6.139
Status
unaffected
Version <=
6.12.*
Version
6.12.89
Status
unaffected
Version <=
6.18.*
Version
6.18.31
Status
unaffected
Version <=
7.0.*
Version
7.0.8
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.039 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|