Description
In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499
Published: 2019-05-08
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-11696 In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499
Ubuntu USN Ubuntu USN USN-4076-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4095-2 Linux kernel (Xenial HWE) vulnerabilities
History

No history.

Subscriptions

Canonical Ubuntu Linux
Google Android
cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2024-08-04T18:35:52.549Z

Reserved: 2018-12-10T00:00:00.000Z

Link: CVE-2019-2054

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-08T17:29:01.333

Modified: 2024-11-21T04:40:08.637

Link: CVE-2019-2054

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-05-01T00:00:00Z

Links: CVE-2019-2054 - Bugzilla

cve-icon OpenCVE Enrichment

No data.