Successful exploitation of the race condition vulnerability could allow
an attacker to trigger a kernel heap overflow, potentially leading to local privilege
escalation and granting system-level access to the affected software.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

Users and administrators of affected product versions are advised to update to the latest version immediately.


Workaround

No workaround given by the vendor.

History

Mon, 27 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-368
References
Metrics threat_severity

None

threat_severity

Important


Mon, 27 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Description Successful exploitation of the race condition vulnerability could allow an attacker to trigger a kernel heap overflow, potentially leading to local privilege escalation and granting system-level access to the affected software.
Title Race Condition Vulnerability
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CSA

Published:

Updated: 2026-04-27T02:35:17.773Z

Reserved: 2026-02-23T05:15:38.972Z

Link: CVE-2026-3006

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-27T03:15:59.277

Modified: 2026-04-27T03:15:59.277

Link: CVE-2026-3006

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-27T02:35:17Z

Links: CVE-2026-3006 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses