Логотип exploitDog
bind:"CVE-2019-1125" OR bind:"CVE-2019-13272"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-1125" OR bind:"CVE-2019-13272"

Количество 51

Количество 51

oracle-oval логотип

ELSA-2019-2411

около 6 лет назад

ELSA-2019-2411: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4746

около 6 лет назад

ELSA-2019-4746: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2019-13272

около 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
EPSS: Высокий
redhat логотип

CVE-2019-13272

около 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
EPSS: Высокий
nvd логотип

CVE-2019-13272

около 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
EPSS: Высокий
debian логотип

CVE-2019-13272

около 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mish ...

CVSS3: 7.8
EPSS: Высокий
ubuntu логотип

CVE-2019-1125

около 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.6
EPSS: Средний
redhat логотип

CVE-2019-1125

около 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.9
EPSS: Средний
nvd логотип

CVE-2019-1125

около 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVSS3: 5.6
EPSS: Средний
msrc логотип

CVE-2019-1125

около 6 лет назад

Windows Kernel Information Disclosure Vulnerability

CVSS3: 5.6
EPSS: Средний
debian логотип

CVE-2019-1125

около 6 лет назад

An information disclosure vulnerability exists when certain central pr ...

CVSS3: 5.6
EPSS: Средний
github логотип

GHSA-87j5-gppq-mq6h

больше 3 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME.

CVSS3: 7.8
EPSS: Высокий
fstec логотип

BDU:2020-01891

около 6 лет назад

Уязвимость функции ptrace_link ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

CVSS3: 7.8
EPSS: Высокий
github логотип

GHSA-r79p-pw9q-gxrc

больше 3 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.

CVSS3: 5.5
EPSS: Средний
oracle-oval логотип

ELSA-2019-4777

около 6 лет назад

ELSA-2019-4777: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4775

около 6 лет назад

ELSA-2019-4775: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4735

около 6 лет назад

ELSA-2019-4735: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4733

около 6 лет назад

ELSA-2019-4733: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2019-04636

около 6 лет назад

Уязвимость операционных систем Windows и Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2019:3263-1

почти 6 лет назад

Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-2411

ELSA-2019-2411: kernel security update (IMPORTANT)

около 6 лет назад
oracle-oval логотип
ELSA-2019-4746

ELSA-2019-4746: Unbreakable Enterprise kernel security update (IMPORTANT)

около 6 лет назад
ubuntu логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
78%
Высокий
около 6 лет назад
redhat логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
78%
Высокий
около 6 лет назад
nvd логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
78%
Высокий
около 6 лет назад
debian логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mish ...

CVSS3: 7.8
78%
Высокий
около 6 лет назад
ubuntu логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.6
13%
Средний
около 6 лет назад
redhat логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.9
13%
Средний
около 6 лет назад
nvd логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVSS3: 5.6
13%
Средний
около 6 лет назад
msrc логотип
CVE-2019-1125

Windows Kernel Information Disclosure Vulnerability

CVSS3: 5.6
13%
Средний
около 6 лет назад
debian логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central pr ...

CVSS3: 5.6
13%
Средний
около 6 лет назад
github логотип
GHSA-87j5-gppq-mq6h

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME.

CVSS3: 7.8
78%
Высокий
больше 3 лет назад
fstec логотип
BDU:2020-01891

Уязвимость функции ptrace_link ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

CVSS3: 7.8
78%
Высокий
около 6 лет назад
github логотип
GHSA-r79p-pw9q-gxrc

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.

CVSS3: 5.5
13%
Средний
больше 3 лет назад
oracle-oval логотип
ELSA-2019-4777

ELSA-2019-4777: Unbreakable Enterprise kernel security update (IMPORTANT)

около 6 лет назад
oracle-oval логотип
ELSA-2019-4775

ELSA-2019-4775: Unbreakable Enterprise kernel security update (IMPORTANT)

около 6 лет назад
oracle-oval логотип
ELSA-2019-4735

ELSA-2019-4735: Unbreakable Enterprise kernel security update (IMPORTANT)

около 6 лет назад
oracle-oval логотип
ELSA-2019-4733

ELSA-2019-4733: Unbreakable Enterprise kernel security update (IMPORTANT)

около 6 лет назад
fstec логотип
BDU:2019-04636

Уязвимость операционных систем Windows и Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.5
13%
Средний
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3263-1

Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)

почти 6 лет назад

Уязвимостей на страницу