Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-2054

Опубликовано: 01 мая 2019
Источник: redhat
CVSS3: 8.4

Описание

In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499

A flaw was found in the Linux kernel's seccomp implementation which contained a method to bypass seccomp syscall filtering policies that allowed ptrace. This could allow an attacker with code execution privileges within the sandbox to use ptrace to execute systemcalls that would be filtered by the policy.

Отчет

Red Hat has considers this CVE as with a 'Moderate' severity due specific conditions required to bypass seccomp. The attacker must have code execution privileges within the seccomp-restricted sandbox and the ptrace syscall should be allowed to be ran, from this perspective this CVE is understood more as a sandbox hardening issue than a important security flaw that'd impact system's core integrity. The outcomes of a possible exploitation is limited to process that are already running within an restricted environment. Additionally this behavior is clearly defined in the seccomp manual page. After reviewing this CVE, Red Hat Enterprise Linux 8 is marked as Not Affected. This decision is based in the fact of the Linux Kernel version shipped already contains the necessary patches which changes the execution order between ptrace and seccomp calls, making seccomp validates and eventual system call changes executed by the ptrace functionality.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelOut of support scope
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelWill not fix
Red Hat Enterprise Linux 7kernel-altWill not fix
Red Hat Enterprise Linux 7kernel-rtWill not fix
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise MRG 2kernel-rtOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-305
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1709898kernel: seccompass mechanism bypass

8.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499

CVSS3: 7.8
nvd
больше 6 лет назад

In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499

CVSS3: 7.8
debian
больше 6 лет назад

In the seccomp implementation prior to kernel version 4.8, there is a ...

CVSS3: 7.8
github
больше 3 лет назад

In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499

CVSS3: 7.8
fstec
больше 9 лет назад

Уязвимость компонента seccomp ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

8.4 High

CVSS3