Количество 25
Количество 25

CVE-2019-13272
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVE-2019-13272
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVE-2019-13272
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
CVE-2019-13272
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mish ...
GHSA-87j5-gppq-mq6h
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME.

BDU:2020-01891
Уязвимость функции ptrace_link ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

SUSE-SU-2019:3263-1
Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)

SUSE-SU-2019:3248-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1)

SUSE-SU-2019:3225-1
Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP4)
ELSA-2019-2411
ELSA-2019-2411: kernel security update (IMPORTANT)

SUSE-SU-2019:3261-1
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2)

SUSE-SU-2019:3260-1
Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2)

SUSE-SU-2019:3249-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP1)

SUSE-SU-2019:3247-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15)

SUSE-SU-2019:3232-1
Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2)

SUSE-SU-2019:3230-1
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3)

SUSE-SU-2019:3224-1
Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP4)

SUSE-SU-2019:3258-1
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)

SUSE-SU-2019:3246-1
Security update for the Linux Kernel (Live Patch 8 for SLE 15)

SUSE-SU-2019:3228-1
Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2019-13272 In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments. | CVSS3: 7.8 | 80% Высокий | почти 6 лет назад |
![]() | CVE-2019-13272 In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments. | CVSS3: 7.8 | 80% Высокий | почти 6 лет назад |
![]() | CVE-2019-13272 In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments. | CVSS3: 7.8 | 80% Высокий | почти 6 лет назад |
CVE-2019-13272 In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mish ... | CVSS3: 7.8 | 80% Высокий | почти 6 лет назад | |
GHSA-87j5-gppq-mq6h In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. | CVSS3: 7.8 | 80% Высокий | около 3 лет назад | |
![]() | BDU:2020-01891 Уязвимость функции ptrace_link ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии | CVSS3: 7.8 | 80% Высокий | почти 6 лет назад |
![]() | SUSE-SU-2019:3263-1 Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3248-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3225-1 Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP4) | больше 5 лет назад | ||
ELSA-2019-2411 ELSA-2019-2411: kernel security update (IMPORTANT) | почти 6 лет назад | |||
![]() | SUSE-SU-2019:3261-1 Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3260-1 Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3249-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP1) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3247-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3232-1 Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3230-1 Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3224-1 Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP4) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3258-1 Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3246-1 Security update for the Linux Kernel (Live Patch 8 for SLE 15) | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3228-1 Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) | больше 5 лет назад |
Уязвимостей на страницу