Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-2054

Опубликовано: 08 мая 2019
Источник: debian

Описание

In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.8.5-1package
linuxignoredjessiepackage

Примечания

  • https://git.kernel.org/linus/0f3912fd934cdfd03d93f2dc6f064099795bf638

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499

CVSS3: 8.4
redhat
почти 7 лет назад

In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499

CVSS3: 7.8
nvd
больше 6 лет назад

In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499

CVSS3: 7.8
github
больше 3 лет назад

In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499

CVSS3: 7.8
fstec
больше 9 лет назад

Уязвимость компонента seccomp ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код