CVE-2026-21996
Integer Divide-by-Zero in DTrace
Publication date: 2026-05-01
Last updated on: 2026-05-05
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | linux | 8 |
| oracle | linux | 10 |
| oracle | linux | 9 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-369 | The product divides a value by zero. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows an unprivileged attacker to cause the dtrace process to crash by using a specially crafted malicious ELF binary. The root cause is an integer Divide-by-Zero error in the function Pbuild_file_symtab().
How can this vulnerability impact me? :
The impact of this vulnerability is a denial of service condition where the dtrace process can be reliably crashed by an attacker with low privileges. This could disrupt system monitoring or diagnostic activities that rely on dtrace.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an unprivileged attacker to crash the dtrace process, impacting availability but not confidentiality or integrity.
Since there is no reported impact on confidentiality or integrity of data, the vulnerability is unlikely to directly affect compliance with standards such as GDPR or HIPAA, which primarily focus on protecting data privacy and integrity.
However, the availability impact could have indirect implications if the affected systems are critical for compliance-related operations, but no specific compliance impact is detailed.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves an unprivileged attacker triggering a crash of the dtrace process by providing a malicious ELF binary that causes an integer divide-by-zero error in the Pbuild_file_symtab() function.
Detection would involve monitoring for crashes or abnormal termination of the dtrace process when processing ELF binaries locally.
No specific detection commands or network-based detection methods are provided in the available information.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, it is recommended to apply the errata fixes released by Oracle for Oracle Linux versions 8, 9, and 10.
- Install the updates corresponding to ELSA-2026-50249, ELSA-2026-50250, and ELSA-2026-50251.
- Restrict unprivileged users from executing or providing malicious ELF binaries to the dtrace process until patches are applied.