In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
|
Information
Published : 2019-07-17 06:15
Updated : 2023-01-17 13:25
NVD link : CVE-2019-13272
Mitre link : CVE-2019-13272
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
netapp
- e-series_performance_analyzer
- hci_compute_node
- h410c_firmware
- h610s_firmware
- aff_a700s_firmware
- active_iq_unified_manager
- h410c
- h610s
- steelstore_cloud_integrated_storage
- service_processor
- solidfire
- aff_a700s
- hci_management_node
- e-series_santricity_os_controller
redhat
- enterprise_linux
- enterprise_linux_for_real_time
fedoraproject
- fedora
canonical
- ubuntu_linux
linux
- linux_kernel
debian
- debian_linux