CVE-2019-13272
CVE Published | 2019-07-17 |
---|---|
Related CWE(s) | CWE-269: Improper Privilege Management |
Related Vendor(s) | fedoraproject, redhat, linux, canonical, netapp, debian |
Related Product(s) | enterprise_linux_for_arm_64, active_iq_unified_manager, h410c_firmware, fedora, steelstore_cloud_integrated_storage, e-series_performance_analyzer, enterprise_linux_for_real_time_for_nfv_tus, enterprise_linux, hci_compute_node, enterprise_linux_for_real_time_tus, enterprise_linux_for_real_time_for_nfv, aff_a700s_firmware, hci_management_node, debian_linux, solidfire, ubuntu_linux, enterprise_linux_for_ibm_z_systems, service_processor, e-series_santricity_os_controller, h610s_firmware, linux_kernel, enterprise_linux_for_real_time |
Exploitation Reported (CISA KEV) | 2021-12-10 |
CVSS 3 Base Score | 7.8 (HIGH) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | LOCAL |
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph