Логотип exploitDog
bind:"CVE-2019-1125" OR bind:"CVE-2019-13272"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-1125" OR bind:"CVE-2019-13272"

Количество 51

Количество 51

oracle-oval логотип

ELSA-2019-2411

почти 6 лет назад

ELSA-2019-2411: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4746

почти 6 лет назад

ELSA-2019-4746: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2019-13272

почти 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
EPSS: Высокий
redhat логотип

CVE-2019-13272

почти 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
EPSS: Высокий
nvd логотип

CVE-2019-13272

почти 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
EPSS: Высокий
debian логотип

CVE-2019-13272

почти 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mish ...

CVSS3: 7.8
EPSS: Высокий
ubuntu логотип

CVE-2019-1125

почти 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a...

CVSS3: 5.6
EPSS: Средний
redhat логотип

CVE-2019-1125

почти 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.9
EPSS: Средний
nvd логотип

CVE-2019-1125

почти 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVSS3: 5.6
EPSS: Средний
msrc логотип

CVE-2019-1125

почти 6 лет назад

Windows Kernel Information Disclosure Vulnerability

CVSS3: 5.6
EPSS: Средний
debian логотип

CVE-2019-1125

почти 6 лет назад

An information disclosure vulnerability exists when certain central pr ...

CVSS3: 5.6
EPSS: Средний
github логотип

GHSA-87j5-gppq-mq6h

около 3 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME.

CVSS3: 7.8
EPSS: Высокий
fstec логотип

BDU:2020-01891

почти 6 лет назад

Уязвимость функции ptrace_link ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

CVSS3: 7.8
EPSS: Высокий
github логотип

GHSA-r79p-pw9q-gxrc

около 3 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.

CVSS3: 5.5
EPSS: Средний
oracle-oval логотип

ELSA-2019-4777

почти 6 лет назад

ELSA-2019-4777: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4775

почти 6 лет назад

ELSA-2019-4775: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4735

почти 6 лет назад

ELSA-2019-4735: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4733

почти 6 лет назад

ELSA-2019-4733: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2019-04636

почти 6 лет назад

Уязвимость операционных систем Windows и Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2019:3263-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-2411

ELSA-2019-2411: kernel security update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2019-4746

ELSA-2019-4746: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 6 лет назад
ubuntu логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
80%
Высокий
почти 6 лет назад
redhat логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
80%
Высокий
почти 6 лет назад
nvd логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
80%
Высокий
почти 6 лет назад
debian логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mish ...

CVSS3: 7.8
80%
Высокий
почти 6 лет назад
ubuntu логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a...

CVSS3: 5.6
15%
Средний
почти 6 лет назад
redhat логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.9
15%
Средний
почти 6 лет назад
nvd логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVSS3: 5.6
15%
Средний
почти 6 лет назад
msrc логотип
CVE-2019-1125

Windows Kernel Information Disclosure Vulnerability

CVSS3: 5.6
15%
Средний
почти 6 лет назад
debian логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central pr ...

CVSS3: 5.6
15%
Средний
почти 6 лет назад
github логотип
GHSA-87j5-gppq-mq6h

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME.

CVSS3: 7.8
80%
Высокий
около 3 лет назад
fstec логотип
BDU:2020-01891

Уязвимость функции ptrace_link ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

CVSS3: 7.8
80%
Высокий
почти 6 лет назад
github логотип
GHSA-r79p-pw9q-gxrc

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.

CVSS3: 5.5
15%
Средний
около 3 лет назад
oracle-oval логотип
ELSA-2019-4777

ELSA-2019-4777: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2019-4775

ELSA-2019-4775: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2019-4735

ELSA-2019-4735: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2019-4733

ELSA-2019-4733: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 6 лет назад
fstec логотип
BDU:2019-04636

Уязвимость операционных систем Windows и Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.5
15%
Средний
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3263-1

Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)

больше 5 лет назад

Уязвимостей на страницу