Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21991: A DTrace component, dtprobed, allows arbitrary file creation through crafted USDT provider names. in Oracle Corporation Oracle Linux

0
Medium
VulnerabilityCVE-2026-21991cvecve-2026-21991
Published: Mon Mar 16 2026 (03/16/2026, 21:36:44 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Linux

Description

CVE-2026-21991 is a medium severity vulnerability affecting the dtprobed component of DTrace in Oracle Linux versions 8, 9, and 10. It allows an attacker with local privileges to create arbitrary files by crafting USDT provider names, exploiting a path traversal weakness (CWE-22). This vulnerability does not impact confidentiality or integrity but can cause denial of service or other disruptions by affecting availability. Exploitation requires low privileges and no user interaction, but local access is necessary. No known exploits are currently reported in the wild. Organizations running Oracle Linux on affected versions should prioritize patching once available and implement strict access controls to limit local user capabilities. Countries with significant Oracle Linux deployments and critical infrastructure relying on Oracle Linux are at higher risk. The CVSS score is 5. 5, reflecting a medium severity level due to the limited scope and impact of the vulnerability.

AI-Powered Analysis

AILast updated: 03/17/2026, 18:29:36 UTC

Technical Analysis

CVE-2026-21991 is a vulnerability in the dtprobed component of DTrace, a dynamic tracing framework used in Oracle Linux versions 8, 9, and 10. The flaw arises from improper handling of User-level Statically Defined Tracing (USDT) provider names, which can be crafted maliciously to exploit a path traversal weakness (CWE-22). This allows an attacker with local privileges to create arbitrary files on the filesystem, potentially overwriting critical files or placing malicious files in sensitive locations. The vulnerability does not directly compromise confidentiality or integrity but can impact system availability by causing denial of service or enabling further local privilege escalation attacks. The attack vector requires local access with low privileges and no user interaction, making it a threat primarily from insider threats or attackers who have already compromised a low-privilege account. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 5.5, indicating a medium severity level, with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H reflecting local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability.

Potential Impact

The primary impact of CVE-2026-21991 is on system availability due to the arbitrary file creation capability. Attackers with local access can exploit this vulnerability to create or overwrite files, potentially disrupting system operations, causing denial of service, or facilitating further attacks such as privilege escalation or persistence mechanisms. Since confidentiality and integrity are not directly affected, the risk is somewhat contained; however, the ability to manipulate files arbitrarily can have cascading effects on system stability and security. Organizations relying on Oracle Linux in critical environments, such as data centers, cloud infrastructure, or enterprise servers, may experience operational disruptions if exploited. The requirement for local access limits remote exploitation but does not eliminate risk from insider threats or attackers who have gained initial footholds through other means.

Mitigation Recommendations

To mitigate CVE-2026-21991, organizations should implement the following specific measures: 1) Monitor and restrict local user privileges rigorously to minimize the number of users who can execute dtprobed or interact with DTrace components. 2) Employ filesystem integrity monitoring to detect unauthorized file creations or modifications, especially in sensitive directories. 3) Use mandatory access control frameworks (e.g., SELinux or AppArmor) to confine dtprobed and limit its filesystem write capabilities. 4) Regularly audit and monitor logs for unusual activity related to DTrace or file creation events. 5) Apply Oracle Linux security updates promptly once patches for this vulnerability are released. 6) Consider disabling or restricting DTrace usage on systems where it is not essential to reduce the attack surface. 7) Educate system administrators and security teams about this vulnerability to ensure rapid detection and response to suspicious behavior. These targeted actions go beyond generic advice by focusing on controlling local privilege abuse and monitoring the specific attack vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.717Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b99a3b771bdb1749cb0c9b

Added to database: 3/17/2026, 6:15:23 PM

Last enriched: 3/17/2026, 6:29:36 PM

Last updated: 3/18/2026, 5:20:59 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses