PT-2019-5200 · Linux +5 · Linux Kernel +5

Jann Horn

·

Published

2019-07-05

·

Updated

2025-08-27

·

CVE-2019-13272

CVSS v3.1
7.8
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

Linux kernel versions prior to 5.1.17

Description:

The issue is related to improper privilege management in the Linux kernel, specifically in the ptrace link function. This can be exploited by local users to obtain root access under certain scenarios involving a parent-child process relationship, where a parent drops privileges and calls execve. Contributing factors include an object lifetime issue and incorrect marking of a ptrace relationship as privileged, which can be exploited through Polkit's pkexec helper with PTRACE TRACEME. The vulnerability can lead to a denial of service or privilege escalation.

Recommendations:

For Linux kernel versions prior to 5.1.17, update to version 5.1.17 or later to resolve the issue. As a temporary workaround, consider using SELinux deny ptrace in some environments to mitigate the risk of exploitation. Additionally, restrict the use of the PTRACE TRACEME system call to minimize the risk of privilege escalation.

Exploit

Fix

Improper Privilege Management

Weakness Enumeration

Related Identifiers

ALT-PU-2019-2246
ALT-PU-2019-2247
ALT-PU-2019-2296
ALT-PU-2019-2314
ALT-PU-2019-2339
ALT-PU-2019-2746
BDU:2020-01891
CESA-2019_2405
CESA-2019_2411
CVE-2019-13272
DLA-1862-1
DLA-1863-1
DSA-4484-1
ELSA-2019-2411
ELSA-2019-4746
RHSA-2019:2405
RHSA-2019:2411
RHSA-2019:2809
RHSA-2019_2405
RHSA-2019_2411
SUSE-SU-2019:2949-1
SUSE-SU-2019:2984-1
SUSE-SU-2019:3223-1
SUSE-SU-2019:3224-1
SUSE-SU-2019:3225-1
SUSE-SU-2019:3228-1
SUSE-SU-2019:3230-1
SUSE-SU-2019:3232-1
SUSE-SU-2019:3246-1
SUSE-SU-2019:3247-1
SUSE-SU-2019:3248-1
SUSE-SU-2019:3249-1
SUSE-SU-2019:3252-1
SUSE-SU-2019:3258-1
SUSE-SU-2019:3260-1
SUSE-SU-2019:3261-1
SUSE-SU-2019:3263-1
SUSE-SU-2019_3228-1
SUSE-SU-2019_3230-1
SUSE-SU-2019_3232-1
SUSE-SU-2019_3246-1
SUSE-SU-2019_3247-1
SUSE-SU-2019_3248-1
SUSE-SU-2019_3249-1
SUSE-SU-2019_3258-1
SUSE-SU-2019_3260-1
SUSE-SU-2019_3261-1
SUSE-SU-2019_3263-1
USN-4093-1
USN-4094-1
USN-4095-1
USN-4117-1
USN-4118-1

Affected Products

Alt Linux
Centos
Linux Kernel
Red Hat
Suse
Ubuntu