Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-13272
HistoryJul 17, 2019 - 12:00 a.m.

CVE-2019-13272

2019-07-1700:00:00
ubuntu.com
ubuntu.com
45

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

20.3%

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c
mishandles the recording of the credentials of a process that wants to
create a ptrace relationship, which allows local users to obtain root
access by leveraging certain scenarios with a parent-child process
relationship, where a parent drops privileges and calls execve (potentially
allowing control by an attacker). One contributing factor is an object
lifetime issue (which can also cause a panic). Another contributing factor
is incorrect marking of a ptrace relationship as privileged, which is
exploitable through (for example) Polkit’s pkexec helper with
PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in
some environments.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux< 4.15.0-58.64UNKNOWN
ubuntu19.04noarchlinux< 5.0.0-25.26UNKNOWN
ubuntu16.04noarchlinux< 4.4.0-159.187UNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1047.49UNKNOWN
ubuntu19.04noarchlinux-aws< 5.0.0-1014.16UNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1090.101UNKNOWN
ubuntu16.04noarchlinux-aws-hwe< 4.15.0-1047.49~16.04.1UNKNOWN
ubuntu18.04noarchlinux-azure< 5.0.0-1014.14~18.04.1UNKNOWN
ubuntu19.04noarchlinux-azure< 5.0.0-1014.14UNKNOWN
ubuntu16.04noarchlinux-azure< 4.15.0-1055.60UNKNOWN
Rows per page:
1-10 of 371

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

20.3%