A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Linux
Subscribe
|
Linux Kernel
Subscribe
|
|
Netapp
Subscribe
|
Active Iq Unified Manager For Vmware Vsphere
Subscribe
Cn1610
Subscribe
Cn1610 Firmware
Subscribe
Hci Management Node
Subscribe
Snapprotect
Subscribe
Solidfire
Subscribe
Storage Replication Adapter For Clustered Data Ontap For Vmware Vsphere
Subscribe
Vasa Provider For Clustered Data Ontap
Subscribe
Virtual Storage Console For Vmware Vsphere
Subscribe
|
|
Redhat
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1799-1 | linux security update |
Debian DLA |
DLA-1799-2 | linux security update |
EUVD |
EUVD-2019-13509 | A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T19:26:26.688Z
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3901
No data.
Status : Modified
Published: 2019-04-22T16:29:01.850
Modified: 2024-11-21T04:42:49.780
Link: CVE-2019-3901
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD