First published: Thu May 12 2022(Updated: )
A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-70.30.1.el9_0 | 0:5.14.0-70.30.1.el9_0 |
redhat/kernel | <0:5.14.0-162.12.1.el9_1 | 0:5.14.0-162.12.1.el9_1 |
redhat/kernel-rt | <0:5.14.0-70.30.1.rt21.102.el9_0 | 0:5.14.0-70.30.1.rt21.102.el9_0 |
redhat/kernel-rt | <0:5.14.0-162.12.1.rt21.175.el9_1 | 0:5.14.0-162.12.1.rt21.175.el9_1 |
redhat/kernel | <3.1 | 3.1 |
Linux Kernel | <4.19.238 | |
Linux Kernel | >=4.20<5.4.189 | |
Linux Kernel | >=5.5.0<5.10.110 | |
Linux Kernel | >=5.11<5.15.33 | |
Linux Kernel | >=5.16.0<5.16.19 | |
Linux Kernel | >=5.17<5.17.2 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
netapp solidfire\, enterprise sds \& hci storage node | ||
netapp solidfire \& hci management node | ||
netapp hci compute node | ||
NetApp AFF 8300 Firmware | ||
NetApp FAS8300 | ||
NetApp AFF 8700 Firmware | ||
NetApp FAS8700 | ||
NetApp AFF A400 Firmware | ||
NetApp FAS A400 | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
All of | ||
NetApp AFF 8300 Firmware | ||
NetApp FAS8300 | ||
All of | ||
NetApp AFF 8700 Firmware | ||
NetApp FAS8700 | ||
All of | ||
NetApp AFF A400 Firmware | ||
NetApp FAS A400 | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
If ptrace is not required, ptrace can be disabled in multiple ways. 1. SELinux policy. # setsebool -P deny_ptrace on 2. Kernel sysctl. # sysctl -w kernel.yama.ptrace_scope=3 Or to make persistent , create /etc/sysctl.d/99-yama-ptrace_scope.conf kernel.yama.ptrace_scope=3 If you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-30594 has a high severity rating as it allows attackers to bypass seccomp restrictions.
To fix CVE-2022-30594, update the Linux kernel to the latest patched version as specified in the security advisories.
CVE-2022-30594 affects Linux kernel versions prior to 5.17.2 and certain versions within the 4.x and 5.x series.
CVE-2022-30594 impacts the Linux kernel, specifically within the PTRACE_SEIZE code path related to seccomp.
CVE-2022-30594 is not remote; it requires local access to the system to exploit the vulnerability.