In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499
Advisories
Source ID Title
EUVD EUVD EUVD-2019-11696 In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499
Ubuntu USN Ubuntu USN USN-4076-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4095-2 Linux kernel (Xenial HWE) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2024-08-04T18:35:52.549Z

Reserved: 2018-12-10T00:00:00

Link: CVE-2019-2054

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-08T17:29:01.333

Modified: 2024-11-21T04:40:08.637

Link: CVE-2019-2054

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-05-01T00:00:00Z

Links: CVE-2019-2054 - Bugzilla

cve-icon OpenCVE Enrichment

No data.