PT-2026-41298 · Linux · Linux Kernel
Published
2026-05-15
·
Updated
2026-05-15
·
CVE-2026-46333
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
An issue exists in the
ptrace component regarding the get dumpable() logic. The dumpability of a task relates to its memory image and whether it can core dump, which is irrelevant for tasks without an associated memory management (mm) pointer. However, ptrace may access() uses the dumpable status to check various conditions independently of the MM, including for threads without a virtual memory (VM), such as kernel threads. Because the ptrace code checks for uid/gid matches, users must be uid-0 to see kernel thread details, meaning the traditional drop capabilities model is ineffective in this context.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux Kernel