ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target process has no special privileges.
The missing validation allows an unprivileged local user to escalate privileges, potentially gaining full control of the affected system.
The missing validation allows an unprivileged local user to escalate privileges, potentially gaining full control of the affected system.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 21 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freebsd
Freebsd freebsd |
|
| Vendors & Products |
Freebsd
Freebsd freebsd |
Thu, 21 May 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target process has no special privileges. The missing validation allows an unprivileged local user to escalate privileges, potentially gaining full control of the affected system. | |
| Title | Missing validation in ptrace(PT_SC_REMOTE) | |
| Weaknesses | CWE-787 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2026-05-21T09:17:29.232Z
Reserved: 2026-05-11T16:27:44.891Z
Link: CVE-2026-45253
No data.
Status : Received
Published: 2026-05-21T10:16:26.270
Modified: 2026-05-21T10:16:26.270
Link: CVE-2026-45253
No data.
OpenCVE Enrichment
Updated: 2026-05-21T11:30:06Z
Weaknesses