Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-30594

Опубликовано: 12 мая 2022
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.

A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.

Меры по смягчению последствий

If ptrace is not required, ptrace can be disabled in multiple ways.

  1. SELinux policy.

setsebool -P deny_ptrace on

  1. Kernel sysctl.

sysctl -w kernel.yama.ptrace_scope=3

Or to make persistent , create /etc/sysctl.d/99-yama-ptrace_scope.conf kernel.yama.ptrace_scope=3 If you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelWill not fix
Red Hat Enterprise Linux 7kernelWill not fix
Red Hat Enterprise Linux 7kernel-rtWill not fix
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2023:273616.05.2023
Red Hat Enterprise Linux 8kernelFixedRHSA-2023:295116.05.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportkernelFixedRHSA-2024:041225.01.2024
Red Hat Enterprise Linux 9kernelFixedRHSA-2022:731802.11.2022
Red Hat Enterprise Linux 9kernelFixedRHSA-2023:033423.01.2023
Red Hat Enterprise Linux 9kernel-rtFixedRHSA-2022:731902.11.2022
Red Hat Enterprise Linux 9kernel-rtFixedRHSA-2023:030023.01.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-276
https://bugzilla.redhat.com/show_bug.cgi?id=2085300kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option

EPSS

Процентиль: 4%
0.00022
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 3 лет назад

The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.

CVSS3: 7.8
nvd
около 3 лет назад

The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.

CVSS3: 7.8
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 7.8
debian
около 3 лет назад

The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTR ...

suse-cvrf
около 3 лет назад

Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3)

EPSS

Процентиль: 4%
0.00022
Низкий

5.5 Medium

CVSS3