This service will be undergoing maintenance at 00:00 UTC, 2016-08-01. It is expected to last about 1 hours
Bug 1028148 - (CVE-2013-2929) CVE-2013-2929 kernel: exec/ptrace: get_dumpable() incorrect tests
CVE-2013-2929 kernel: exec/ptrace: get_dumpable() incorrect tests
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20131107,reported=2...
: Security
Depends On: 1039483 1039484 1039486 1039487 1039488 1039489 1111605 1111606
Blocks: 1028151
  Show dependency treegraph
 
Reported: 2013-11-07 13:52 EST by Petr Matousek
Modified: 2015-10-15 17:12 EDT (History)
21 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A flaw was found in the way the get_dumpable() function return value was interpreted in the ptrace subsystem of the Linux kernel. When 'fs.suid_dumpable' was set to 2, a local, unprivileged local user could use this flaw to bypass intended ptrace restrictions and obtain potentially sensitive information.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-10-15 17:12:24 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Petr Matousek 2013-11-07 13:52:23 EST
The get_dumpable() return value is not boolean.  Most users of the function actually want to be testing for non-SUID_DUMP_USER(1) rather than SUID_DUMP_DISABLE(0).  The SUID_DUMP_ROOT(2) is also considered a protected state. 

If the system had set the sysctl fs.suid_dumpable=2, a user was able to ptrace attach to processes that he would otherwise be unable to because of the dumpable check.

Upstream fix:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d049f74f2dbe71354d43d393ac3a188947811348
Comment 4 errata-xmlrpc 2014-01-28 12:40:57 EST
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2014:0100 https://rhn.redhat.com/errata/RHSA-2014-0100.html
Comment 5 errata-xmlrpc 2014-02-11 13:16:14 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:0159 https://rhn.redhat.com/errata/RHSA-2014-0159.html
Comment 6 errata-xmlrpc 2014-03-12 14:29:23 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2014:0285 https://rhn.redhat.com/errata/RHSA-2014-0285.html
Comment 8 Martin Prpic 2014-12-03 04:20:23 EST
IssueDescription:

A flaw was found in the way the get_dumpable() function return value was interpreted in the ptrace subsystem of the Linux kernel. When 'fs.suid_dumpable' was set to 2, a local, unprivileged local user could use this flaw to bypass intended ptrace restrictions and obtain potentially sensitive information.
Comment 9 errata-xmlrpc 2014-12-09 15:33:42 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2014:1971 https://rhn.redhat.com/errata/RHSA-2014-1971.html
Comment 10 Vincent Danen 2015-10-15 17:12:24 EDT
Statement:

(none)

Note You need to log in before you can comment on or make changes to this bug.