Bug 2310451 (CVE-2024-45770) - CVE-2024-45770 pcp: pmpost symlink attack allows escalating pcp to root user
Summary: CVE-2024-45770 pcp: pmpost symlink attack allows escalating pcp to root user
Keywords:
Status: NEW
Alias: CVE-2024-45770
Deadline: 2024-09-17
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2313490
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-09-06 17:17 UTC by OSIDB Bzimport
Modified: 2024-09-24 14:48 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:7057 0 None None None 2024-09-24 14:48:09 UTC
Red Hat Product Errata RHBA-2024:7058 0 None None None 2024-09-24 14:46:42 UTC
Red Hat Product Errata RHSA-2024:6837 0 None None None 2024-09-19 11:48:46 UTC
Red Hat Product Errata RHSA-2024:6840 0 None None None 2024-09-19 11:37:26 UTC
Red Hat Product Errata RHSA-2024:6842 0 None None None 2024-09-19 12:11:35 UTC
Red Hat Product Errata RHSA-2024:6843 0 None None None 2024-09-19 11:39:53 UTC
Red Hat Product Errata RHSA-2024:6844 0 None None None 2024-09-19 12:11:50 UTC
Red Hat Product Errata RHSA-2024:6846 0 None None None 2024-09-19 11:31:05 UTC
Red Hat Product Errata RHSA-2024:6847 0 None None None 2024-09-19 12:12:14 UTC
Red Hat Product Errata RHSA-2024:6848 0 None None None 2024-09-19 12:12:54 UTC

Description OSIDB Bzimport 2024-09-06 17:17:49 UTC
This issue is somewhat similar to CVE-2023-6917 from a previous audit.

`pmpost` is used to append messages to the "PCP notice board". It is called
from different contexts, one of which is as `root` from within the `pmcd`
startup script. The program writes the message provided on the command line
to the file in /var/log/pcp/NOTICES.

The directory /var/log/pcp belongs to pcp:pcp. The file is opened without
passing the `O_NOFOLLOW` flag, thus it will open symlinks placed there by the
pcp user. This would allow `pmpost` to be coerced into creating new files
in arbitrary locations, or to corrupt arbitrary existing files in the system.

Furthermore, if the NOTICES file is newly created and `pmpost` runs as root,
then a `fchown()` to pcp:pcp is executed on the file. Thus it allows to pass
the ownership of arbitrary newly created files in the system to pcp:pcp.

Comment 1 errata-xmlrpc 2024-09-19 11:31:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:6846 https://access.redhat.com/errata/RHSA-2024:6846

Comment 2 errata-xmlrpc 2024-09-19 11:37:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2024:6840 https://access.redhat.com/errata/RHSA-2024:6840

Comment 3 errata-xmlrpc 2024-09-19 11:39:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:6843 https://access.redhat.com/errata/RHSA-2024:6843

Comment 4 errata-xmlrpc 2024-09-19 11:48:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:6837 https://access.redhat.com/errata/RHSA-2024:6837

Comment 5 errata-xmlrpc 2024-09-19 12:11:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:6842 https://access.redhat.com/errata/RHSA-2024:6842

Comment 6 errata-xmlrpc 2024-09-19 12:11:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:6844 https://access.redhat.com/errata/RHSA-2024:6844

Comment 7 errata-xmlrpc 2024-09-19 12:12:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:6847 https://access.redhat.com/errata/RHSA-2024:6847

Comment 8 errata-xmlrpc 2024-09-19 12:12:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:6848 https://access.redhat.com/errata/RHSA-2024:6848


Note You need to log in before you can comment on or make changes to this bug.