// For flags

CVE-2019-13272

Linux Kernel Improper Privilege Management Vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

22
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

En el kernel de Linux anterior a versión 5.1.17, ptrace_link en el archivo kernel/ptrace.c maneja inapropiadamente la grabación de las credenciales de un proceso que desea crear una relación de ptrace, que permite a los usuarios locales obtener acceso de root aprovechando determinados escenarios con un relación de proceso padre-hijo, donde un padre elimina los privilegios y llama a execve (permitiendo potencialmente el control por parte de un atacante). Un factor que contribuye es un problema de vida útil del objeto (que también puede causar un pánico). Otro factor que contribuye es el marcado incorrecto de una relación de ptrace como privilegiada, que puede ser explotada mediante (por ejemplo) el ayudante pkexec de Polkit con PTRACE_TRACEME. NOTA: deny_ptrace de SELinux puede ser una solución útil en algunos entornos.

A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel's implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.

Linux suffers from broken permission and object lifetime handling for PTRACE_TRACEME.

Kernel/ptrace.c in Linux kernel mishandles contains an improper privilege management vulnerability that allows local users to obtain root access.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-04 CVE Reserved
  • 2019-07-16 CVE Published
  • 2019-07-17 First Exploit
  • 2021-12-10 Exploited in Wild
  • 2022-06-10 KEV Due Date
  • 2024-07-25 EPSS Updated
  • 2024-08-04 CVE Updated
CWE
  • CWE-271: Privilege Dropping / Lowering Errors
CAPEC
References (48)
URL Date SRC
https://www.exploit-db.com/exploits/47133 2019-07-17
https://www.exploit-db.com/exploits/47163 2019-07-24
https://www.exploit-db.com/exploits/50541 2021-11-23
https://www.exploit-db.com/exploits/47543 2019-10-24
https://github.com/jas502n/CVE-2019-13272 2019-07-31
https://github.com/Cyc1eC/CVE-2019-13272 2019-07-31
https://github.com/oneoy/CVE-2019-13272 2019-07-31
https://github.com/polosec/CVE-2019-13272 2020-03-05
https://github.com/MDS1GNAL/ptrace_scope-CVE-2019-13272-privilege-escalation 2024-03-27
https://github.com/datntsec/CVE-2019-13272 2020-12-25
https://github.com/babyshen/CVE-2019-13272 2022-03-10
https://github.com/asepsaepdin/CVE-2019-13272 2023-09-05
https://github.com/josemlwdf/CVE-2019-13272 2024-07-25
https://github.com/teddy47/CVE-2019-13272---Documentation 2020-05-13
https://github.com/RashmikaEkanayake/Privilege-Escalation-CVE-2019-13272- 2020-05-12
https://github.com/jana30116/CVE-2019-13272-Local-Privilege-Escalation 2021-05-20
https://github.com/sumedhaDharmasena/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272 2020-05-02
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html 2024-08-04
http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html 2024-08-04
http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html 2024-08-04
http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html 2024-08-04
https://bugs.chromium.org/p/project-zero/issues/detail?id=1903 2024-08-04
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netapp
Search vendor "Netapp"
Aff A700s Firmware
Search vendor "Netapp" for product "Aff A700s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
Aff A700s
Search vendor "Netapp" for product "Aff A700s"
--
Safe
Netapp
Search vendor "Netapp"
H410c Firmware
Search vendor "Netapp" for product "H410c Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H410c
Search vendor "Netapp" for product "H410c"
--
Safe
Netapp
Search vendor "Netapp"
H610s Firmware
Search vendor "Netapp" for product "H610s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H610s
Search vendor "Netapp" for product "H610s"
--
Safe
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 3.16.52 < 3.16.71
Search vendor "Linux" for product "Linux Kernel" and version " >= 3.16.52 < 3.16.71"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.1.39 < 4.2
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.1.39 < 4.2"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.4.40 < 4.4.185
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.4.40 < 4.4.185"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.8.16 < 4.9
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.8.16 < 4.9"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.9.1 < 4.9.185
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.9.1 < 4.9.185"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.10 < 4.14.133
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.10 < 4.14.133"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.15 < 4.19.58
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.15 < 4.19.58"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.20 < 5.1.17
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.20 < 5.1.17"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
29
Search vendor "Fedoraproject" for product "Fedora" and version "29"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
16.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04"
esm
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
18.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04"
esm
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
19.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "19.04"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
7.0
Search vendor "Redhat" for product "Enterprise Linux" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
8.0
Search vendor "Redhat" for product "Enterprise Linux" and version "8.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Arm 64
Search vendor "Redhat" for product "Enterprise Linux For Arm 64"
7.0_aarch64
Search vendor "Redhat" for product "Enterprise Linux For Arm 64" and version "7.0_aarch64"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Ibm Z Systems
Search vendor "Redhat" for product "Enterprise Linux For Ibm Z Systems"
7.0_s390x
Search vendor "Redhat" for product "Enterprise Linux For Ibm Z Systems" and version "7.0_s390x"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time
Search vendor "Redhat" for product "Enterprise Linux For Real Time"
8
Search vendor "Redhat" for product "Enterprise Linux For Real Time" and version "8"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time For Nfv
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv"
8.0
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv" and version "8.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time For Nfv Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus"
8.2
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time For Nfv Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus"
8.4
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" and version "8.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time For Nfv Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus"
8.6
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" and version "8.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time For Nfv Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus"
8.8
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" and version "8.8"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus"
8.2
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus"
8.4
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" and version "8.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus"
8.6
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" and version "8.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus"
8.8
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" and version "8.8"
-
Affected
Netapp
Search vendor "Netapp"
Active Iq Unified Manager
Search vendor "Netapp" for product "Active Iq Unified Manager"
-vmware_vsphere
Affected
Netapp
Search vendor "Netapp"
E-series Performance Analyzer
Search vendor "Netapp" for product "E-series Performance Analyzer"
--
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Os Controller
Search vendor "Netapp" for product "E-series Santricity Os Controller"
>= 11.0.0 <= 11.60.3
Search vendor "Netapp" for product "E-series Santricity Os Controller" and version " >= 11.0.0 <= 11.60.3"
-
Affected
Netapp
Search vendor "Netapp"
Hci Management Node
Search vendor "Netapp" for product "Hci Management Node"
--
Affected
Netapp
Search vendor "Netapp"
Service Processor
Search vendor "Netapp" for product "Service Processor"
--
Affected
Netapp
Search vendor "Netapp"
Solidfire
Search vendor "Netapp" for product "Solidfire"
--
Affected
Netapp
Search vendor "Netapp"
Steelstore Cloud Integrated Storage
Search vendor "Netapp" for product "Steelstore Cloud Integrated Storage"
--
Affected
Netapp
Search vendor "Netapp"
Hci Compute Node
Search vendor "Netapp" for product "Hci Compute Node"
--
Affected