⚠ Actively exploited
Added to CISA KEV on 2021-12-10. Federal agencies required to patch by 2022-06-10. Required action: Apply updates per vendor instructions..
CVE-2019-13272
20 documents12 sources
7.8
CVSS
EPSS80.6%(99th)
CISA KEVPublic ExploitExploited in WildCISA Required Action: Apply updates per vendor instructions.
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
Also affects: Enterprise Linux 7.0, 8.0, 8, 8.2, 8.4, 8.6, 8.8, Debian Linux 10.0, 8.0, 9.0, Ubuntu Linux 16.04, 18.04, 19.04, Fedora 29
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is i…
🔴Vulnerability Details
4💥Exploits & PoCs
4Exploit-DB
▶