Oval Definition:oval:com.ubuntu.cosmic:def:2019132720000000
Revision Date:2019-07-17Version:1
Title:CVE-2019-13272 on Ubuntu 18.10 (cosmic) - medium.
Description:In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2019-13272
Platform(s):Ubuntu 18.10
Product(s):
Definition Synopsis
  • Ubuntu 18.10 (cosmic) is installed.
  • AND Package Information
  • linux: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-aws: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-azure: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-gcp: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-kvm: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-meta: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-meta-aws: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-meta-azure: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-meta-gcp: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-meta-kvm: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-meta-oem: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-meta-raspi2: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-oem: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-oracle: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-raspi2: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-signed: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-signed-azure: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-signed-gcp: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • OR linux-signed-oem: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'reached end-of-life').
  • BACK