First published: Tue Jul 16 2019(Updated: )
A flaw in the kernels implementation of ptrace which could inadvertantly grant elevated permissions to an attacker who could abuse the relationship between tracer and the process being traced. The mechanism used to link the process requesting the ptrace and the process being ptraced could allow a local user to obtain root level priviledges by creating an opportunity to abuse the frequently used pattern of dropping privileges and then execve a child with reduced privileges/permissions. References: <a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1903">https://bugs.chromium.org/p/project-zero/issues/detail?id=1903</a> <a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17</a> <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee</a> <a href="https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee">https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <0:4.14.0-115.12.1.el7a | 0:4.14.0-115.12.1.el7a |
redhat/kernel-rt | <0:4.18.0-80.7.2.rt9.154.el8_0 | 0:4.18.0-80.7.2.rt9.154.el8_0 |
redhat/kernel | <0:4.18.0-80.7.2.el8_0 | 0:4.18.0-80.7.2.el8_0 |
redhat/kernel | <5.1.17 | 5.1.17 |
Linux Linux kernel | >=3.16.52<3.16.71 | |
Linux Linux kernel | >=4.1.39<4.2 | |
Linux Linux kernel | >=4.4.40<4.4.185 | |
Linux Linux kernel | >=4.8.16<4.9 | |
Linux Linux kernel | >=4.9.1<4.9.185 | |
Linux Linux kernel | >=4.10<4.14.133 | |
Linux Linux kernel | >=4.15<4.19.58 | |
Linux Linux kernel | >=4.20<5.1.17 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =29 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux For Real Time | =8 | |
Netapp Aff A700s Firmware | ||
NetApp AFF A700s | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
Netapp H610s Firmware | ||
Netapp H610s | ||
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp E-series Performance Analyzer | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.60.3 | |
Netapp Hci Management Node | ||
NetApp Service Processor | ||
Netapp Solidfire | ||
Netapp Steelstore Cloud Integrated Storage | ||
Netapp Hci Compute Node | ||
Canonical Ubuntu Linux | =18.04 | |
Redhat Enterprise Linux For Arm 64 | =7.0_aarch64 | |
Redhat Enterprise Linux For Ibm Z Systems | =7.0_s390x | |
Redhat Enterprise Linux For Real Time For Nfv | =8.0 | |
Redhat Enterprise Linux For Real Time For Nfv Tus | =8.2 | |
Redhat Enterprise Linux For Real Time For Nfv Tus | =8.4 | |
Redhat Enterprise Linux For Real Time For Nfv Tus | =8.6 | |
Redhat Enterprise Linux For Real Time For Nfv Tus | =8.8 | |
Redhat Enterprise Linux For Real Time Tus | =8.2 | |
Redhat Enterprise Linux For Real Time Tus | =8.4 | |
Redhat Enterprise Linux For Real Time Tus | =8.6 | |
Redhat Enterprise Linux For Real Time Tus | =8.8 | |
All of | ||
Netapp Aff A700s Firmware | ||
NetApp AFF A700s | ||
All of | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
All of | ||
Netapp H610s Firmware | ||
Netapp H610s | ||
Linux kernel | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)