The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html | Third Party Advisory VDB Entry |
https://bugs.chromium.org/p/project-zero/issues/detail?id=2276 | Exploit Mailing List Patch Third Party Advisory |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2 | Mailing List Patch Vendor Advisory |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3 | Mailing List Patch Vendor Advisory |
https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220707-0001/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5173 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-862 |
23 Feb 2023, 18:42
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html - Third Party Advisory, VDB Entry |
03 Jan 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Oct 2022, 19:29
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 | |
CVSS |
v2 : v3 : |
v2 : 4.4
v3 : 7.8 |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:solidfire\,_enterprise_sds_\&_hci_storage_node:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* |
|
First Time |
Netapp solidfire\, Enterprise Sds \& Hci Storage Node
Netapp h500s Netapp a400 Netapp h410s Firmware Debian Netapp 8300 Firmware Netapp solidfire \& Hci Management Node Netapp 8700 Firmware Netapp 8300 Netapp h700s Netapp h300s Netapp h410c Netapp h410c Firmware Debian debian Linux Netapp Netapp a400 Firmware Netapp h300s Firmware Netapp hci Compute Node Netapp h700s Firmware Netapp h410s Netapp 8700 Netapp h500s Firmware |
|
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5173 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20220707-0001/ - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html - Mailing List, Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html - Third Party Advisory, VDB Entry |
07 Jul 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Jul 2022, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Jul 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 May 2022, 17:33
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-276 | |
References | (MISC) https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2 - Mailing List, Patch, Vendor Advisory | |
References | (MISC) https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3 - Patch, Third Party Advisory | |
References | (MISC) https://bugs.chromium.org/p/project-zero/issues/detail?id=2276 - Exploit, Mailing List, Patch, Third Party Advisory | |
References | (MISC) https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3 - Mailing List, Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux
Linux linux Kernel |
12 May 2022, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-12 05:15
Updated : 2023-12-10 14:22
NVD link : CVE-2022-30594
Mitre link : CVE-2022-30594
CVE.ORG link : CVE-2022-30594
JSON object : View
Products Affected
netapp
- h700s_firmware
- 8700
- h410s
- solidfire_\&_hci_management_node
- 8300
- 8700_firmware
- solidfire\,_enterprise_sds_\&_hci_storage_node
- h300s
- h700s
- hci_compute_node
- a400
- 8300_firmware
- h410s_firmware
- h500s
- a400_firmware
- h300s_firmware
- h410c
- h500s_firmware
- h410c_firmware
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-862
Missing Authorization