[CIVN-2026-0250] Race Condition Vulnerability in Linux Kernel

By Published On: May 20, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Race Condition Vulnerability in Linux Kernel


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Linux kernel version 4.10

Overview


A vulnerability has been reported in the Linux Kernel that could allow a local attacker to access sensitive information on the targeted system.


Target Audience:

All organizations and individuals running affected versions of the Linux kernel.


Risk Assessment:

High risk of unauthorized access to sensitive data.


Impact Assessment:

Potential for sensitive information disclosure, unauthorized access.


Description


The Linux kernel is the core component of many operating systems, responsible for managing hardware resources and providing essential system services, including cryptographic operations.


This vulnerability exists in the Linux kernel due to a race condition in the __ptrace_may_access() function, where the kernel improperly skips the dumpable permission check when a process¿s memory descriptor (mm) becomes NULL during process exit.


Successful exploitation of this vulnerability could allow a local attacker to access sensitive information on the targeted system.


Solution


Apply the latest kernel updates provided by your Linux distribution or upstream maintainers:

https://git.kernel.org/stable/c/93d4ba49d18e3d7fb41a9927c2d0cca5e9dfefd6


https://git.kernel.org/stable/c/15b828a46f305ae9f05a7c16914b3ce273474205


https://git.kernel.org/stable/c/4709234fd1b95136ceb789f639b1e7ea5de1b181


https://git.kernel.org/stable/c/8f907d345bae8f4b3f004c5abc56bf2dfb851ea7


https://git.kernel.org/stable/c/6e5b51e74a40d377bcd3081dd33fbaa0e1aa7e3d


https://git.kernel.org/stable/c/2a93a4fac7b6051d3be7cd1b015fe7320cd0404d


https://git.kernel.org/stable/c/01363cb3fbd0238ffdeb09f53e9039c9edf8a730


https://git.kernel.org/stable/c/31e62c2ebbfdc3fe3dbdf5e02c92a9dc67087a3a



References


 

https://gbhackers.com/linux-ssh-keysign-pwn-flaw/

https://www.suse.com/security/cve/CVE-2026-46333.html

https://access.redhat.com/security/cve/cve-2026-46333

https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/

https://ubuntu.com/security/CVE-2026-46333

https://security-tracker.debian.org/tracker/CVE-2026-46333


CVE Name

CVE-2026-46333




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmoN1MUACgkQ3jCgcSdc

ys9l7Q//VPC97zw32YLKVMhKl5AOFvQsE/FFIed0z+0VIOeVbzIGJicVoJ7ahEFH

DVEpCpR0rFaOoACSeDe/4N1zjIGFU7gpxdreftEUkeSkdMMcw3LfYx6nTWFkpFZz

E1nZFoRRe4jSeMLws0MZqdYetLIqWuyUG0ZSZa6osiHybK+E35r6aXiJuu5nZ3yr

Qq4tG6LYmECJlGK4HRU55qW7EpSv6GOrxzKojexfvBgWiVt5YXIcEvjq5zQemruY

ZnZE7rBmluQ3QbhpORB0H0KJc8E++TliGOsRXnOnNw0yTrxCKqpB2RvTipZ1bUk0

mLQEOzwbKnF6QiyyGpRLBFEtqFCFj9zObPUH+/o+szAYHPi9H/MIQ+TfboPFKd6o

m56sWbsiX1LAa4AeV5ipjiGMN/KIcEkbbtJceipTJCmcKNUrzt+IvjBsj4BqOaIW

7/zxlFb/7L6IJGR9Cju+BPQjKKhtKjtULOX4R+SirYFHUjdkMSfVb0aeC1yZ3vqm

exONdXescfQM/v5FLdnJCILj7/SiabQ8ZtcsGmACEYPJeqtnDtY2gnZrJYpql8ta

CJzwHGRgJs0Zsh5AinhWXBj0gHLvAsglq9jDbpIbNlP8nQIuisqN/Rwpyzfl+EDX

rlrr42HuXmaCMbAf28IlBBcLnSod1pMZ3lKLVJrzgjXDnZUAWb4=

=P8oM

—–END PGP SIGNATURE—–

Share this article