Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3864

Опубликовано: 20 окт. 2021
Источник: redhat
CVSS3: 7

Описание

A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.

Отчет

This issue is rated as having Moderate impact for Red Hat Enterprise Linux 8 because of the core_pattern default setting (both for ABRT and non-ABRT use cases) that doesn't place core dumps relative to current directory. The other versions of the Red Hat Enterprise Linux out of the box is not vulnerable to the described issue too.

Меры по смягчению последствий

Red Hat Enterprise Linux 6 and 7 default core_pattern setting is "core", which places the core dumps into the current working directory. Changing the default settings to use absolute pathnames will prevent this issue from being exploited. When using ABRT, set MakeCompatCore value in /etc/abrt/plugins/CCpp.conf to "no" to avoid ABRT falling back to previous core_pattern setting on core dumps.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2015046kernel: descendant's dumpable setting with certain SUID binaries

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
больше 3 лет назад

A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.

CVSS3: 7
nvd
больше 3 лет назад

A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.

CVSS3: 7
debian
больше 3 лет назад

A flaw was found in the way the dumpable flag setting was handled when ...

CVSS3: 7
github
больше 3 лет назад

A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.

7 High

CVSS3