Hide Forgot
A flaw in the kernels implementation of ptrace which could inadvertantly grant elevated permissions to an attacker who could abuse the relationship between tracer and the process being traced. The mechanism used to link the process requesting the ptrace and the process being ptraced could allow a local user to obtain root level priviledges by creating an opportunity to abuse the frequently used pattern of dropping privileges and then execve a child with reduced privileges/permissions. References: https://bugs.chromium.org/p/project-zero/issues/detail?id=1903 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1730897]
This flaw is rated as Important. The attack vector is available by default in the affected installations and the selinux boolean to deny ptrace is not defaultly enabled
Statement: Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201
Mitigation: For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:2405 https://access.redhat.com/errata/RHSA-2019:2405
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-13272
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:2411 https://access.redhat.com/errata/RHSA-2019:2411
This issue has been addressed in the following products: OpenShift Container Platform 4 Via RHBA-2019:2417 https://access.redhat.com/errata/RHBA-2019:2417
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2809 https://access.redhat.com/errata/RHSA-2019:2809
OpenShift Container Platform 4 does not ship its own kernel package, instead using versions shipped in RHEL. Removing from flaw bug affects.