Description
In the Linux kernel, the following vulnerability has been resolved:

ptrace: slightly saner 'get_dumpable()' logic

The 'dumpability' of a task is fundamentally about the memory image of
the task - the concept comes from whether it can core dump or not - and
makes no sense when you don't have an associated mm.

And almost all users do in fact use it only for the case where the task
has a mm pointer.

But we have one odd special case: ptrace_may_access() uses 'dumpable' to
check various other things entirely independently of the MM (typically
explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for
threads that no longer have a VM (and maybe never did, like most kernel
threads).

It's not what this flag was designed for, but it is what it is.

The ptrace code does check that the uid/gid matches, so you do have to
be uid-0 to see kernel thread details, but this means that the
traditional "drop capabilities" model doesn't make any difference for
this all.

Make it all make a *bit* more sense by saying that if you don't have a
MM pointer, we'll use a cached "last dumpability" flag if the thread
ever had a MM (it will be zero for kernel threads since it is never
set), and require a proper CAP_SYS_PTRACE capability to override.
Published: 2026-05-15
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises in the Linux kernel’s ptrace subsystem where the dumpability flag, intended to indicate whether a process’s memory image can be core‑dumped, is mistakenly used as a generic permission test for ptrace operations even when the target task has no memory map. Because ptrace_may_access relies on this flag for checks unrelated to the memory map, a process that can call ptrace on a kernel thread can potentially read or modify that thread’s state. The check still enforces UID/GID matching and requires the CAP_SYS_PTRACE capability for overriding the flag, so only privileged users or processes with that capability can exploit the weakness. The impact is primarily the disclosure of kernel‑space data that would otherwise be protected from such processes.

Affected Systems

Affected systems are all Linux kernel releases that have not yet integrated the commit that corrects the get_dumpable logic. The change is present in the mainline kernel, so any kernel older than the timestamp of that commit is vulnerable. This includes every architecture supported by the kernel family, such as x86_64, arm64, and others, regardless of distribution, as long as the underlying kernel code lacks the patch.

Risk and Exploitability

The CVSS base score and EPSS value are not provided, and the vulnerability is not listed in CISA’s KEV catalog. Because exploitation requires the CAP_SYS_PTRACE capability (or root privileges), the attack vector is local and limited to users who already possess elevated privileges. An attacker with such a capability can use ptrace to retrieve kernel thread information, resulting in information disclosure. The exploitation effort beyond having the capability is minimal, but the requirement for elevated privileges protects the vulnerability from general exploitation by normal users. The lack of a quantifiable score makes the risk assessment qualitative: systems that grant CAP_SYS_PTRACE widely or use low ptrace scope settings face a higher practical threat.

Generated by OpenCVE AI on May 15, 2026 at 16:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the commit correcting get_dumpable logic.
  • Configure the kernel’s yama.ptrace_scope sysctl (kernel.yama.ptrace_scope) to at least 1, limiting ptrace usage to trusted processes.
  • Remove the CAP_SYS_PTRACE capability from untrusted user accounts, granting it only to trusted administrators.

Generated by OpenCVE AI on May 15, 2026 at 16:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6274-1 linux security update
Debian DSA Debian DSA DSA-6275-1 linux security update
History

Fri, 15 May 2026 20:30:00 +0000

Type Values Removed Values Added
References

Fri, 15 May 2026 13:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointer. But we have one odd special case: ptrace_may_access() uses 'dumpable' to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It's not what this flag was designed for, but it is what it is. The ptrace code does check that the uid/gid matches, so you do have to be uid-0 to see kernel thread details, but this means that the traditional "drop capabilities" model doesn't make any difference for this all. Make it all make a *bit* more sense by saying that if you don't have a MM pointer, we'll use a cached "last dumpability" flag if the thread ever had a MM (it will be zero for kernel threads since it is never set), and require a proper CAP_SYS_PTRACE capability to override.
Title ptrace: slightly saner 'get_dumpable()' logic
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-15T19:31:47.905Z

Reserved: 2026-05-13T15:03:33.113Z

Link: CVE-2026-46333

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T14:16:35.793

Modified: 2026-05-15T20:16:49.353

Link: CVE-2026-46333

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T16:15:03Z

Weaknesses

No weakness.