Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2067 articles · 154829 vulns · 36/41 feeds (7d)
← Back to list
7.1
CVE-2026-46333EXPLOITEDPATCHED
linux · kernel

ptrace: slightly saner 'get_dumpable()' logic

Description

CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path. The Qualys Threat Research Unit (TRU) has discovered and published the full advisory for CVE-2026-46333, a logic flaw in the Linux kernel's __ptrace_may_access() function that permits an unprivileged local user to disclose sensitive files and execute arbitrary commands as root on default installations of several major distributions. The bug has resided in mainline Linux since November 2016 (v4.10-rc1). Upstream patches and distribution updates are already available. Working exploits are circulating publicly, and administrators should apply vendor kernel updates without delay. During ongoing research into Linux kernel privilege boundaries, TRU identified a narrow window in which a privileged process that is dropping its credentials remains reachable through ptrace-family operations even though its dumpable flag should have closed that path. By pairing this window with the pidfd_getfd() syscall (added in v5.6-rc1, January 2020), an attacker can capture open file descriptors and authenticated inter-process channels from a dying privileged process and re-use them under their own uid. The primitive is reliable and turns any local shell into a path to root or to sensitive credential material. To characterize impact across real systems, TRU built four exploits against widely deployed userland targets: chage (set-uid-root or set-gid-shadow): discloses /etc/shadow. Tested on default installs of Debian 13, Ubuntu 24.04, Ubuntu 26.04, Fedora 43, and Fedora 44. ssh-keysign (set-uid-root): discloses host private keys under /etc/ssh/*_key. Tested on default installs of Debian 13, Ubuntu 24.04, and Ubuntu 26.04. pkexec (set-uid-root): executes arbitrary commands as root. The attacker can be remotely logged in via sshd provided an allow_active session is present at the console. Tested on default installs of Debian 13, Ubuntu Desktop 24.04 and 26.04, and Fedora Workstation 43 and 44. accounts-daemon (root daemon): executes arbitrary commands as root. Tested on default installs of Debian 13, Fedora Workstation 43, and Fedora Workstation 44. These four were drawn from prior research projects rather than an exhaustive sweep of the userland attack surface. Other set-uid, set-gid, file-capability binaries, and root daemons may be exploitable through the same primitive.

Affected Products

VendorProductVersions
linuxkernelbfedb589252c01fa505ac9f6f2a3d5d68d707ef4, bfedb589252c01fa505ac9f6f2a3d5d68d707ef4, bfedb589252c01fa505ac9f6f2a3d5d68d707ef4, bfedb589252c01fa505ac9f6f2a3d5d68d707ef4, bfedb589252c01fa505ac9f6f2a3d5d68d707ef4, bfedb589252c01fa505ac9f6f2a3d5d68d707ef4, bfedb589252c01fa505ac9f6f2a3d5d68d707ef4, bfedb589252c01fa505ac9f6f2a3d5d68d707ef4, d5b3e840dbf6dd2c0f30b5982b6f5ecd49e46b12, 03eed7afbc09e061f66b448daf7863174c3dc3f3, e45692fa1aea06676449b63ef3c2b6e1e72b7578, 694a95fa6dae4991f16cda333d897ea063021fed, 4.10, v5.6-rc1

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%
open sourcelinux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/93d4ba49d18e3d7fb41a9927c2d0cca5e9dfefd6
  • https://git.kernel.org/stable/c/15b828a46f305ae9f05a7c16914b3ce273474205
  • https://git.kernel.org/stable/c/4709234fd1b95136ceb789f639b1e7ea5de1b181
  • https://git.kernel.org/stable/c/8f907d345bae8f4b3f004c5abc56bf2dfb851ea7
  • https://git.kernel.org/stable/c/6e5b51e74a40d377bcd3081dd33fbaa0e1aa7e3d
  • https://git.kernel.org/stable/c/2a93a4fac7b6051d3be7cd1b015fe7320cd0404d
  • https://git.kernel.org/stable/c/01363cb3fbd0238ffdeb09f53e9039c9edf8a730
  • https://git.kernel.org/stable/c/31e62c2ebbfdc3fe3dbdf5e02c92a9dc67087a3a

Related News (11 articles)

Tier D
The Hacker News3h ago
9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros
→ No new info (linked only)
Tier E
Lobsters Security16h ago
Logic bug in the Linux kernel's __ptrace_may_access() function (CVE-2026-46333)
→ No new info (linked only)
Tier C
oss-security19h ago
Re: Multiple vulnerabilities in AppArmor
→ No new info (linked only)
Tier C
oss-security19h ago
Re: Logic bug in the Linux kernel's __ptrace_may_access() function
→ No new info (linked only)
Tier C
Qualys Blog19h ago
CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path
→ No new info (linked only)
Tier C
Qualys Blog19h ago
CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path
→ No new info (linked only)
Tier B
BSI Advisories2d ago
[NEU] [mittel] Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
→ No new info (linked only)
Tier A
Microsoft MSRC5d ago
CVE-2026-46333 ptrace: slightly saner 'get_dumpable()' logic
→ No new info (linked only)
Tier E
Hacker News5d ago
CVE-2026-46333 (SSH-keysign-pwn)
→ No new info (linked only)
Tier C
VulDB5d ago
CVE-2026-46333 | Linux Kernel up to 7.0.7 ptrace get_dumpable privilege escalation
→ No new info (linked only)
Tier C
Linux Kernel CVEs5d ago
CVE-2026-46333: ptrace: slightly saner 'get_dumpable()' logic
→ No new info (linked only)
CVSS 3.17.1 HIGH
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
31e62c2
PublishedMay 15, 2026
Last enriched3h agov6
Tags
local privilege escalationcredential disclosurelogic buglocal-onlysevere impacthistorical exposure
Trending Score90
Source articles11
Independent9
Info Completeness10/14
Missing: epss, cwe, kev, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-31431EXPKEV
crypto: algif_aead - Revert to operating out-of-place
Trending: 142
HIGHCVE-2026-43284EXPKEV
xfrm: esp: avoid in-place decrypt on shared skb frags
Trending: 140
CRITICALCVE-2026-43500EXPKEV
rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present
Trending: 131
CRITICALCVE-2026-43493EXP
crypto: pcrypt - Fix handling of MAY_BACKLOG requests
Trending: 59
CRITICALCVE-2026-31702EXP
f2fs: fix use-after-free of sbi in f2fs_compress_write_end_io()
Trending: 49

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 15, 2026
Discovered by ZDM
May 15, 2026
Updated: affectedVersions
May 15, 2026
Updated: severity, exploitAvailable, activelyExploited
May 18, 2026
Updated: iocs, tags
May 20, 2026
Updated: description, patchAvailable, tags
May 20, 2026
Actively Exploited
May 20, 2026
Exploit Available
May 20, 2026
Patch Available
May 20, 2026
Updated: description, affectedVersions, tags
May 21, 2026

Version History

v6
Last enriched 3h ago
v6Tier C3h ago

Updated description with detailed technical information and added new affected version v5.6-rc1 and new tags.

descriptionaffectedVersionstags
via Qualys Blog
v5Tier C18h ago

Updated description to include a logic bug in __ptrace_may_access() and added a new patch version along with new relevant tags.

descriptionpatchAvailabletags
via oss-security
v4Tier C19h ago

Updated description with detailed technical information about CVE-2026-46333, changed severity to HIGH, and added relevant tags and IOC.

iocstags
via Qualys Blog
v3Tier B2d ago

Updated severity to HIGH and marked the vulnerability as exploit available and actively exploited.

severityexploitAvailableactivelyExploited
via BSI Advisories
v2Tier C5d ago

Updated description with details about CVE-2026-46333, added affected version 7.0.7, and changed severity to HIGH.

affectedVersions
via VulDB
v15d ago

Initial creation