Bug 1709898 (CVE-2019-2054)
Summary: | CVE-2019-2054 kernel: seccompass mechanism bypass | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | msiddiqu |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, airlied, bhu, blc, brdeoliv, bskeggs, cscribne, dbaker, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jkacur, john.j5live, jonathan, josef, jross, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, plougher, pmatouse, rt-maint, rvrbovsk, security-response-team, steved, williams, wmealing |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel's seccomp implementation which contained a method to bypass seccomp syscall filtering policies that allowed ptrace. This could allow an attacker with code execution privileges within the sandbox to use ptrace to execute systemcalls that would be filtered by the policy.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-05-30 01:45:05 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1709899 |
Description
msiddiqu
2019-05-14 14:00:15 UTC
At this time Red Hat Product security considers this more system-hardening than a flaw. This behavior is clearly defined in the seccomp man page and there is a chance that systems may rely on that behavior. I will create public-facing "hardening" bugs for Red Hat Enterprise Linux kernels for : 6 (https://bugzilla.redhat.com/show_bug.cgi?id=1715268) : 7 (https://bugzilla.redhat.com/show_bug.cgi?id=1715271) : 7-alt (https://bugzilla.redhat.com/show_bug.cgi?id=1715272 ) : 8 (https://bugzilla.redhat.com/show_bug.cgi?id=1715436 ) Where interest can be voiced by customers/interested parties. |