First published: Mon Apr 25 2016(Updated: )
A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1127.rt56.1093.el7 | 0:3.10.0-1127.rt56.1093.el7 |
redhat/kernel | <0:3.10.0-1127.el7 | 0:3.10.0-1127.el7 |
redhat/kernel | <0:3.10.0-957.56.1.el7 | 0:3.10.0-957.56.1.el7 |
redhat/kernel | <0:3.10.0-1062.26.1.el7 | 0:3.10.0-1062.26.1.el7 |
IBM Data Risk Manager | <=2.0.6 | |
Linux Kernel | <4.8 | |
Debian | =8.0 | |
NetApp Active IQ Unified Manager | >=9.5 | |
NetApp SolidFire & HCI Management Node | ||
NetApp SnapProtect | ||
NetApp SolidFire & HCI Storage Node | ||
NetApp Storage Replication Adapter | >=7.2 | |
NetApp VASA Provider | >=7.2 | |
NetApp Virtual Storage Console | >=7.2 | |
All of | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-3901 is considered a high severity vulnerability due to its potential for local attackers to leak sensitive data from setuid programs.
To fix CVE-2019-3901, update your kernel to a version that is patched against this vulnerability, such as kernel-rt 3.10.0-1127.rt56.1093.el7 or kernel 3.10.0-1127.el7.
CVE-2019-3901 affects Red Hat kernels, including kernel-rt and various versions of IBM Data Risk Manager.
CVE-2019-3901 allows local attackers to leak sensitive data through a race condition when accessing setuid programs.
As of now, there are no known public exploits specifically targeting CVE-2019-3901.