Bug 2066652 - Kernel: seccomp PT_SUSPEND_SECCOMP permission bypass
Summary: Kernel: seccomp PT_SUSPEND_SECCOMP permission bypass
Keywords:
Status: CLOSED DUPLICATE of bug 2085300
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2066648
TreeView+ depends on / blocked
 
Reported: 2022-03-22 09:41 UTC by Rohit Keshri
Modified: 2022-08-17 09:51 UTC (History)
49 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2022-08-17 09:51:17 UTC
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2022-03-22 09:41:47 UTC
The PT_SUSPEND_SECCOMP ptrace flag, which suppresses all seccomp checks for a process on kernels with CONFIG_CHECKPOINT_RESTORE, is supposed to only be settable by a ptracer with global CAP_SYS_ADMIN and no seccomp restrictions, but this is only enforced on the PTRACE_SETOPTIONS path. The PTRACE_SEIZE path can set the same flag, but doesn't do the privilege checks.

Comment 4 Rohit Keshri 2022-08-17 09:51:17 UTC

*** This bug has been marked as a duplicate of bug 2085300 ***


Note You need to log in before you can comment on or make changes to this bug.