In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
| AND |
|
Configuration 9 (hide)
|
Information
Published : 2019-07-17 13:15
Updated : 2021-11-28 23:34
NVD link : CVE-2019-13272
Mitre link : CVE-2019-13272
JSON object : View
Products Affected
netapp
- aff_a700s
- hci_management_node
- e-series_performance_analyzer
- h410c_firmware
- hci_compute_node
- active_iq_unified_manager
- h410c
- solidfire
- e-series_santricity_os_controller
- aff_a700s_firmware
- service_processor
- h610s_firmware
- h610s
- steelstore_cloud_integrated_storage
debian
- debian_linux
fedoraproject
- fedora
linux
- linux_kernel
redhat
- enterprise_linux
- enterprise_linux_for_real_time
canonical
- ubuntu_linux
CWE
CWE-269
Improper Privilege Management
