CVE-2021-3864
setuid program that exec's can coredump in dir not writable by caller; priv-esc possible
References
Notes
bwh> The PoC exploits logrotate's lax parsing of configuration files
bwh> to inject commands via the coredump, but I think generally we
bwh> should assume that bypassing write-protection in any way can
bwh> lead to privilege escalation.
bwh> sudo is an important part of the PoC and should disable core-
bwh> dumps by default.
bwh> It's less clear what should be done in the kernel; possibly
bwh> some resource limits should be reset on exec of a setuid
bwh> program - see
bwh> https://lore.kernel.org/linux-api/87fso91n0v.fsf_-_@email.froward.int.ebiederm.org/
Bugs
Status
Branch |
Status |
4.19-buster-security |
needed
|
4.19-upstream-stable |
needed
|
5.10-bullseye-security |
needed
|
5.10-upstream-stable |
needed
|
6.1-bookworm-security |
needed
|
6.1-upstream-stable |
needed
|
6.6-upstream-stable |
unknown
|
6.8-upstream-stable |
unknown
|
sid |
needed
|
upstream |
needed
|