PT-2019-5200 · Linux+5 · Linux Kernel+5
Jann Horn
·
Published
2019-07-05
·
Updated
2026-03-10
·
CVE-2019-13272
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Linux kernel versions prior to 5.1.17
Description
The issue is related to improper privilege management in the Linux kernel, specifically in the ptrace link function. This can be exploited by local users to obtain root access under certain scenarios involving a parent-child process relationship, where a parent drops privileges and calls execve. Contributing factors include an object lifetime issue and incorrect marking of a ptrace relationship as privileged, which can be exploited through Polkit's pkexec helper with PTRACE TRACEME. The vulnerability can lead to a denial of service or privilege escalation.
Recommendations
For Linux kernel versions prior to 5.1.17, update to version 5.1.17 or later to resolve the issue. As a temporary workaround, consider using SELinux deny ptrace in some environments to mitigate the risk of exploitation. Additionally, restrict the use of the PTRACE TRACEME system call to minimize the risk of privilege escalation.
Exploit
Fix
Improper Privilege Management
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Alt Linux
Centos
Linux Kernel
Red Hat
Suse
Ubuntu