TROYANOSYVIRUS
Voltar para CVEs

CVE-2019-13272

HIGHCISA KEV
7.8

Descricao

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

Detalhes CVE

Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado7/17/2019
Ultima modificacao11/6/2025
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorLinux
ProdutoKernel
Nome da vulnerabilidadeLinux Kernel Improper Privilege Management Vulnerability
Data inclusao KEV2021-12-10
Prazo de remediacao2022-06-10
Uso em ransomwareUnknown

Produtos afetados

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoralinux:linux_kernelnetapp:active_iq_unified_managernetapp:aff_a700snetapp:aff_a700s_firmwarenetapp:e-series_performance_analyzernetapp:e-series_santricity_os_controllernetapp:h410cnetapp:h410c_firmwarenetapp:h610snetapp:h610s_firmwarenetapp:hci_compute_nodenetapp:hci_management_nodenetapp:service_processornetapp:solidfirenetapp:steelstore_cloud_integrated_storageredhat:enterprise_linuxredhat:enterprise_linux_for_arm_64redhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_for_real_time_for_nfvredhat:enterprise_linux_for_real_time_for_nfv_tusredhat:enterprise_linux_for_real_time_tus

Referencias

https://access.redhat.com/errata/RHSA-2019:2405(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2411(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2809(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1730895(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.suse.com/show_bug.cgi?id=1140671(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Jul/30(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Jul/33(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190806-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K91025336(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4093-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4094-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4095-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4117-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4118-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4484(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.