PT-2019-5200 · Linux +5 · Linux Kernel +5
Jann Horn
·
Published
2019-07-05
·
Updated
2025-08-27
·
CVE-2019-13272
7.8
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Linux kernel versions prior to 5.1.17
Description:
The issue is related to improper privilege management in the Linux kernel, specifically in the ptrace link function. This can be exploited by local users to obtain root access under certain scenarios involving a parent-child process relationship, where a parent drops privileges and calls execve. Contributing factors include an object lifetime issue and incorrect marking of a ptrace relationship as privileged, which can be exploited through Polkit's pkexec helper with PTRACE TRACEME. The vulnerability can lead to a denial of service or privilege escalation.
Recommendations:
For Linux kernel versions prior to 5.1.17, update to version 5.1.17 or later to resolve the issue. As a temporary workaround, consider using SELinux deny ptrace in some environments to mitigate the risk of exploitation. Additionally, restrict the use of the PTRACE TRACEME system call to minimize the risk of privilege escalation.
Exploit
Fix
Improper Privilege Management
Related Identifiers
Affected Products
References · 584
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/ptrace_traceme_pkexec_helper.rb⭐ 35285 🔗 14255 · Exploit
- 🔥 https://github.com/jas502n/CVE-2019-13272⭐ 329 🔗 109 · Exploit
- 🔥 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816⭐ 59 🔗 15 · Exploit
- 🔥 https://github.com/bitdefender/swapgs-attack-poc⭐ 41 🔗 11 · Exploit
- 🔥 https://github.com/butterflyhack/CVE-2019-10207⭐ 19 🔗 6 · Exploit
- 🔥 https://github.com/Cyc1eC/CVE-2019-13272⭐ 5 🔗 6 · Exploit
- 🔥 https://github.com/oneoy/CVE-2019-13272⭐ 3 🔗 8 · Exploit
- 🔥 https://exploit-db.com/exploits/47133 · Exploit
- 🔥 https://exploit-db.com/exploits/47163 · Exploit
- 🔥 http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html · Exploit
- 🔥 https://exploit-db.com/exploits/50541 · Exploit
- 🔥 https://exploit-db.com/exploits/47543 · Exploit
- 🔥 http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html · Exploit
- 🔥 http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html · Exploit
- 🔥❌ https://github.com/Huandtx/CVE-2019-13272 · Exploit, Deleted