Back

Oracle Linux Kernel ptrace Vulnerability CVE-2026-46333 Disclosed

Severity: High (Score: 74.0)

Sources: Linuxsecurity

Published: 2026-05-22 · Updated: 2026-05-22

Keywords: ptrace, slightly, saner, get_dumpable, logic, linus, oracle

Summary

Oracle has disclosed a critical security vulnerability in the ptrace functionality of its Linux kernels, identified as CVE-2026-46333. This vulnerability affects multiple versions of Oracle Linux, including Oracle Linux 8, 9, and the Unbreakable Enterprise Kernel (UEK). The flaw allows unauthorized access to process memory, which could potentially be exploited to gain elevated privileges. The vulnerability was published on May 15, 2026, with a proof of concept (PoC) available as of May 16, 2026. Users are advised to apply the latest patches immediately to mitigate risks. The affected kernel versions include 6.12.0-202.76.4.3 and 5.15.0-320.202.8.4 for Oracle Linux 9 and 8, respectively. The issue has been confirmed by Oracle and is being treated with urgency due to its potential impact on system security. Key Points: • CVE-2026-46333 affects Oracle Linux 8 and 9, allowing unauthorized process memory access. • Patches are available, and users are urged to update their systems immediately. • The vulnerability was disclosed on May 15, 2026, with a PoC released shortly after.

Detailed Analysis

**Impact** Oracle Linux users across versions 8, 9, and 10 are affected by this kernel vulnerability, specifically those running UEK kernel versions 5.15.0-320, 6.12.0-202, and related builds. The vulnerability impacts systems globally where Oracle Linux is deployed, including enterprise and cloud environments relying on these kernels. Potential consequences include unauthorized process tracing, which could lead to privilege escalation or exposure of sensitive process information. No specific data breach numbers or sector-specific impacts are provided. **Technical Details** The vulnerability, tracked as CVE-2026-46333, involves the Linux kernel ptrace subsystem and relates to the 'get_dumpable()' logic. The flaw allows manipulation of process tracing permissions, potentially enabling attackers to bypass security controls. The fix involves kernel updates in UEK versions 5.15.0-320.202.8.4 and 6.12.0-202.76.4.3 for Oracle Linux 8, 9, and 10. No malware, specific attack tools, or IOCs are mentioned in the sources. The attack vector is local privilege escalation via ptrace misuse. **Recommended Response** Apply the updated UEK kernel packages released for Oracle Linux 8, 9, and 10 immediately, specifically versions 5.15.0-320.202.8.4 and 6.12.0-202.76.4.3. Harden system configurations by restricting ptrace access to trusted users only. Monitor for unusual ptrace activity or privilege escalation attempts. No additional detection signatures or IOCs are currently available.

Source articles (5)

  • Oracle Linux ELSA-2026-50279 Important Kernel ptrace CVE-2026 — Linuxsecurity · 2026-05-22
    [6.12.0-202.76.4.3] - ptrace: slightly saner 'get_dumpable()' logic (Linus Torvalds) [Orabug: 39391434] {CVE-2026-46333} [6.12.0-202.76.4.3] - ptrace: slightly saner 'get_dumpable()' logic (Linus Torv…
  • Oracle Linux 8 Kernel Important Security Fix ELSA-2026-50280 CVE-2026 — Linuxsecurity · 2026-05-22
    [5.15.0-320.202.8.4] - ptrace: slightly saner 'get_dumpable()' logic (Linus Torvalds) [Orabug: 39391447] {CVE-2026-46333} [5.15.0-320.202.8.4] - ptrace: slightly saner 'get_dumpable()' logic (Linus To…
  • Oracle Linux 9 Kernel Important ptrace Issue ELSA-2026-50280 CVE-2026 — Linuxsecurity · 2026-05-22
    [5.15.0-320.202.8.4] - ptrace: slightly saner 'get_dumpable()' logic (Linus Torvalds) [Orabug: 39391447] {CVE-2026-46333} [5.15.0-320.202.8.4] - ptrace: slightly saner 'get_dumpable()' logic (Linus To…
  • Oracle Linux 9 Kernel Important ptrace Security Issue ELSA-2026 — Linuxsecurity · 2026-05-22
    [6.12.0-202.76.4.3] - ptrace: slightly saner 'get_dumpable()' logic (Linus Torvalds) [Orabug: 39391434] {CVE-2026-46333} [6.12.0-202.76.4.3] - ptrace: slightly saner 'get_dumpable()' logic (Linus Torv…
  • Oracle Linux 8 libsndfile Security Advisory ELSA-2026-19559 CVE-2026 — Linuxsecurity · 2026-05-22
    Warning : Undefined array key "references" in /var/www/ on line 11 libsndfile-1.0.28-17.el8_10.i686.rpm libsndfile-1.0.28-17.el8_10.x86_64.rpm libsndfile-devel-1.0.28-17.el8_10.i686.rpm libsndfile-dev…

Timeline

  • 2026-05-15 — CVE-2026-46333 published: Oracle disclosed a ptrace vulnerability affecting multiple Oracle Linux versions, allowing unauthorized access to process memory.
  • 2026-05-16 — First public PoC released: A proof of concept demonstrating the exploitation of CVE-2026-46333 was made public, increasing urgency for patching.
  • 2026-05-22 — Patches released: Oracle released patches for the affected kernel versions, urging users to apply them to secure their systems.

CVEs

  • CVE-2026-37555
  • CVE-2026-46333

Related entities

  • 202.76.4.3 (Ipv4)
  • Linux (Platform)
  • Oracle Linux (Platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed