PT-2026-41298 · Linux · Linux Kernel

Published

2026-05-15

·

Updated

2026-05-15

·

CVE-2026-46333

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description An issue exists in the ptrace component regarding the get dumpable() logic. The dumpability of a task relates to its memory image and whether it can core dump, which is irrelevant for tasks without an associated memory management (mm) pointer. However, ptrace may access() uses the dumpable status to check various conditions independently of the MM, including for threads without a virtual memory (VM), such as kernel threads. Because the ptrace code checks for uid/gid matches, users must be uid-0 to see kernel thread details, meaning the traditional drop capabilities model is ineffective in this context.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Related Identifiers

CVE-2026-46333

Affected Products

Linux Kernel