CVE-2019-13272

Scores

EPSS

0.806high80.6%
0%20%40%60%80%100%

Percentile: 80.6%

CVSS

7.8high3.x
0246810

CVSS Score: 7.8/10

All CVSS Scores

CVSS 3.x
7.8

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

CVSS 2.0
7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Description

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit’s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

astradebiannvdredhatubuntu

CWEs

CWE-271

Related Vulnerabilities

Exploits

Exploit ID: CVE-2019-13272

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 47133

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47133

Exploit ID: 47163

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47163

Exploit ID: 47543

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47543

Exploit ID: 50541

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50541

Recommendations

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: https://access.redhat.com/errata/RHSA-2019:2411

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: https://access.redhat.com/errata/RHSA-2019:2405

Vulnerable Software (247)

Type: Configuration

Product: kernel

Operating System: rhel 8

Trait:
{  "fixed": "4.18.0-80.7.2.el8_0"}

Source: redhat

Type: Configuration

Product: kernel-alt

Operating System: rhel 7

Trait:
{  "fixed": "4.14.0-115.12.1.el7a"}

Source: redhat

Type: Configuration

Product: kernel-headers-modules-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-headers-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-image-domU-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-image-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-modules-drm-ancient-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-modules-drm-nouveau-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-modules-drm-radeon-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-modules-drm-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-modules-ide-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-modules-kvm-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-modules-staging-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-modules-v4l-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:5.1.17-alt1"}

Source: redhat

Type: Configuration

Product: kernel-rt

Operating System: rhel

Trait:
{  "fixed": "4.18.0-80.7.2.rt9.154.el8_0"}

Source: redhat

Type: Configuration

Product: linux

Operating System: astra 1.6.5

Trait:
{  "unaffected": true}

Source: astra

Type: Configuration

Product: linux

Operating System: debian

Trait:
{  "fixed": "4.19.37-6"}

Source: debian

Type: Configuration

Product: linux

Operating System: ubuntu cosmic 18.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu focal 20.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu questing 25.10

Trait:
{  "unaffected": true}

Source: ubuntu