Osquery Linux Foundation Osquery

Do you want an email whenever new security vulnerabilities are reported in Linux Foundation Osquery?

By the Year

In 2024 there have been 0 vulnerabilities in Linux Foundation Osquery . Osquery did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 3 7.50
2019 1 8.10
2018 1 7.80

It may take a day or so for new Osquery vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Linux Foundation Osquery Security Vulnerabilities

osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework

CVE-2020-26273 5.2 - Medium - December 16, 2020

osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework. In osquery before version 4.6.0, by using sqlite's ATTACH verb, someone with administrative access to osquery can cause reads and writes to arbitrary sqlite databases on disk. This _does_ allow arbitrary files to be created, but they will be sqlite databases. It does not appear to allow existing non-sqlite files to be overwritten. This has been patched in osquery 4.6.0. There are several mitigating factors and possible workarounds. In some deployments, the people with access to these interfaces may be considered administrators. In some deployments, configuration is managed by a central tool. This tool can filter for the `ATTACH` keyword. osquery can be run as non-root user. Because this also limits the desired access levels, this requires deployment specific testing and configuration.

Command Injection

osquery before version 4.4.0 enables a privilege escalation vulnerability

CVE-2020-11081 8.2 - High - July 10, 2020

osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This is fixed in version 4.4.0.

Process Control

Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could

CVE-2020-1887 9.1 - Critical - March 13, 2020

Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.

Improper Certificate Validation

In some configurations an attacker

CVE-2019-3567 8.1 - High - June 03, 2019

In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load said malicious executable with SYSTEM permissions. The solution is to migrate installations to the 'Program Files' directory on Windows which restricts unprivileged write access. This issue affects osquery prior to v3.4.0.

insecure temporary file

An issue was discovered in osquery

CVE-2018-6336 7.8 - High - December 31, 2018

An issue was discovered in osquery. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute. This issue affects osquery prior to v3.2.7

Improper Validation of Integrity Check Value

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Linux Foundation Osquery or by Linux Foundation? Click the Watch button to subscribe.

subscribe