Description
A DTrace component, dtprobed, allows arbitrary file creation through crafted USDT provider names.
Published: 2026-03-16
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file creation
Action: Apply patch
AI Analysis

Impact

A flaw in Oracle Linux’s DTrace tool, dtprobed, allows a malicious actor to create files anywhere on the system by supplying specially crafted User‑Level Statically Defined Tracing provider names. The resulting files could be binaries, configuration files, or other artifacts that might be used for persistence or privilege escalation if the attacker has sufficient rights. The vulnerability is classified as CWE‑22, indicating a file or directory creation or traversal issue.

Affected Systems

Oracle Linux 8, 9, and 10 are affected. The common platform enumeration strings indicate that every release in these three major series is susceptible, and no sub‑version distinctions are provided, so any current installation of these operating systems should be considered vulnerable unless a vendor‑specific update is applied.

Risk and Exploitability

The CVSS score of 5.5 shows a medium severity, and the EPSS score of less than 1% suggests that automated exploitation is uncommon. The vulnerability is not listed in the CISA KEV catalog, so no widely deployed exploits are known. The likely attack vector requires an attacker to influence the dtprobed component or supply a crafted USDT provider name, which in practice means local or elevated privileges or the ability to trigger dtprobed. Based on the description, it is inferred that the attacker must run under a user with write access to the target directories or have the ability to execute dtprobed with such privileges. If such conditions are met, the flaw could enable arbitrary file creation, potentially leading to privilege escalation or persistence actions.

Generated by OpenCVE AI on April 7, 2026 at 10:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Oracle Linux security update that patches dtprobed to fix the arbitrary file creation flaw
  • If no patch is available, disable or restrict use of USDT provider names by configuring dtprobed or stopping the dtprobed service
  • Ensure that operations involving USDT providers are performed only by trusted users with appropriate privileges
  • Monitor system file events for unexpected creation of system files or binaries

Generated by OpenCVE AI on April 7, 2026 at 10:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title DTrace dtprobed Arbitrary File Creation via Crafted USDT Provider Names

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Oracle
Oracle linux
CPEs cpe:2.3:o:oracle:linux:10:0:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:8:-:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:9:0:*:*:*:*:*:*
Vendors & Products Oracle
Oracle linux

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Title DTrace dtprobed Arbitrary File Creation via Crafted USDT Provider Names

Tue, 17 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Oracle Corporation
Oracle Corporation oracle Linux
Vendors & Products Oracle Corporation
Oracle Corporation oracle Linux

Mon, 16 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Description A DTrace component, dtprobed, allows arbitrary file creation through crafted USDT provider names.
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Oracle Linux
Oracle Corporation Oracle Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2026-03-17T13:35:45.790Z

Reserved: 2026-01-05T18:07:34.717Z

Link: CVE-2026-21991

cve-icon Vulnrichment

Updated: 2026-03-17T13:35:41.575Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T22:16:18.397

Modified: 2026-04-07T01:02:06.683

Link: CVE-2026-21991

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T20:01:33Z

Weaknesses