Note:
This project will be discontinued after December 13, 2021. [more]
2019-04-12
The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
Products | Linux_kernel |
Type | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (CWE-362) |
First patch | - None (likely due to unavailable code) |
Links |
• http://www.securityfocus.com/bid/107890
• https://usn.ubuntu.com/4008-3/ • https://usn.ubuntu.com/4008-1/ • https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=e1676b55d874a43646e8b2c46d87f2f3e45516ff • https://usn.ubuntu.com/4008-2/
• https://www.openwall.com/lists/oss-security/2019/04/03/4/1
• https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html • http://www.openwall.com/lists/oss-security/2019/04/15/1 • https://www.openwall.com/lists/oss-security/2019/04/03/4 • https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=a5b5352558f6808db0589644ea5401b3e3148a0d • https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html |