libseccomp before 2.4.0 did not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE), which might able to lead to bypassing seccomp filters and potential privilege escalations.
References
Configurations
History
21 Nov 2024, 04:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html - | |
References | () https://access.redhat.com/errata/RHSA-2019:3624 - | |
References | () https://github.com/seccomp/libseccomp/issues/139 - Patch | |
References | () https://seclists.org/oss-sec/2019/q1/179 - Mailing List, Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201904-18 - | |
References | () https://usn.ubuntu.com/4001-1/ - | |
References | () https://usn.ubuntu.com/4001-2/ - |
Information
Published : 2019-03-21 16:01
Updated : 2024-11-21 04:52
NVD link : CVE-2019-9893
Mitre link : CVE-2019-9893
CVE.ORG link : CVE-2019-9893
JSON object : View
Products Affected
libseccomp_project
- libseccomp
CWE