Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://linux.oracle.com/cve/CVE-2026-35233.html |
|
Tue, 05 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oracle
Oracle linux |
|
| CPEs | cpe:2.3:o:oracle:linux:10:0:*:*:*:*:*:* cpe:2.3:o:oracle:linux:8:-:*:*:*:*:*:* cpe:2.3:o:oracle:linux:9:0:*:*:*:*:*:* |
|
| Vendors & Products |
Oracle
Oracle linux |
Sat, 02 May 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out‑of‑Bounds ELF Parsing in dtrace Causes Crash or Privilege Escalation |
Fri, 01 May 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oracle Corporation
Oracle Corporation oracle Linux |
|
| Vendors & Products |
Oracle Corporation
Oracle Corporation oracle Linux |
Fri, 01 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| Metrics |
ssvc
|
Fri, 01 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unprivileged attacker can craft a user-space process with a malicious ELF binary containing an out-of-range sh_link field. When root-level dtrace attaches to -- or instruments -- that process (via dtrace -p , pid probes, or USDT), the ELF parser reads heap memory beyond the allocated section cache array without any bounds check. This results in an uninitialized/out-of-bounds heap read that can cause a NULL pointer dereference crash of the dtrace process (DoS), or -- depending on heap layout -- a read-then-use of a garbage pointer controlled by adjacent allocations, providing a foothold toward further exploitation in a privileged context. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2026-05-01T18:16:32.848Z
Reserved: 2026-04-01T20:03:40.833Z
Link: CVE-2026-35233
Updated: 2026-05-01T18:16:28.686Z
Status : Analyzed
Published: 2026-05-01T18:16:14.647
Modified: 2026-05-05T17:46:30.743
Link: CVE-2026-35233
No data.
OpenCVE Enrichment
Updated: 2026-05-02T07:00:06Z