CVE-2019-13272

CVE Published 2019-07-17
Related CWE(s) CWE-269: Improper Privilege Management
Related Vendor(s) fedoraproject, redhat, linux, canonical, netapp, debian
Related Product(s) enterprise_linux_for_arm_64, active_iq_unified_manager, h410c_firmware, fedora, steelstore_cloud_integrated_storage, e-series_performance_analyzer, enterprise_linux_for_real_time_for_nfv_tus, enterprise_linux, hci_compute_node, enterprise_linux_for_real_time_tus, enterprise_linux_for_real_time_for_nfv, aff_a700s_firmware, hci_management_node, debian_linux, solidfire, ubuntu_linux, enterprise_linux_for_ibm_z_systems, service_processor, e-series_santricity_os_controller, h610s_firmware, linux_kernel, enterprise_linux_for_real_time
Exploitation Reported (CISA KEV) 2021-12-10
CVSS 3 Base Score 7.8 (HIGH)
CVSS 3 Attack Complexity LOW
CVSS 3 Attack Vector LOCAL

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Associated CAPEC Patterns

References