vulnerability
Ubuntu: (Multiple Advisories) (CVE-2019-13272): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 2019-07-17 | 2019-08-14 | 2025-01-23 |
Description
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
Solution(s)
References
- CVE-2019-13272
- https://attackerkb.com/topics/CVE-2019-13272
- DEBIAN-DSA-4484
- NVD-CVE-2019-13272
- UBUNTU-USN-3821-1
- UBUNTU-USN-3821-2
- UBUNTU-USN-3879-1
- UBUNTU-USN-3879-2
- UBUNTU-USN-3910-1
- UBUNTU-USN-3910-2
- UBUNTU-USN-3932-1
- UBUNTU-USN-3932-2
- UBUNTU-USN-4005-1
- UBUNTU-USN-4008-1
- UBUNTU-USN-4008-3
- UBUNTU-USN-4068-1
- UBUNTU-USN-4068-2
- UBUNTU-USN-4069-1
- UBUNTU-USN-4069-2
- UBUNTU-USN-4076-1
- UBUNTU-USN-4093-1
- UBUNTU-USN-4094-1
- UBUNTU-USN-4095-1
- UBUNTU-USN-4095-2
- UBUNTU-USN-4114-1
- UBUNTU-USN-4115-1
- UBUNTU-USN-4116-1
- UBUNTU-USN-4117-1
- UBUNTU-USN-4118-1
- UBUNTU-USN-4145-1
- UBUNTU-USN-4147-1
- UBUNTU-USN-4211-1
- UBUNTU-USN-4211-2
- UBUNTU-USN-4286-1
- UBUNTU-USN-4286-2
- UBUNTU-USN-4351-1
- UBUNTU-USN-4708-1
- UBUNTU-USN-4709-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.