The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. Reference: https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2 https://bugs.chromium.org/p/project-zero/issues/detail?id=2276 Upstream: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3 https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3
*** Bug 2066652 has been marked as a duplicate of this bug. ***
I'm keeping this moderate, I see other distros and people doing CVSSv3 scores with C:H I:H A:H , which I don't see how that works...
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:7318 https://access.redhat.com/errata/RHSA-2022:7318
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:7319 https://access.redhat.com/errata/RHSA-2022:7319
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0300 https://access.redhat.com/errata/RHSA-2023:0300
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0334 https://access.redhat.com/errata/RHSA-2023:0334
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2736 https://access.redhat.com/errata/RHSA-2023:2736
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2951 https://access.redhat.com/errata/RHSA-2023:2951
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-30594
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0412