Логотип exploitDog
bind:"BDU:2020-01891" OR bind:"CVE-2019-13272"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2020-01891" OR bind:"CVE-2019-13272"

Количество 25

Количество 25

fstec логотип

BDU:2020-01891

почти 6 лет назад

Уязвимость функции ptrace_link ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

CVSS3: 7.8
EPSS: Высокий
ubuntu логотип

CVE-2019-13272

почти 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
EPSS: Высокий
redhat логотип

CVE-2019-13272

почти 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
EPSS: Высокий
nvd логотип

CVE-2019-13272

почти 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
EPSS: Высокий
debian логотип

CVE-2019-13272

почти 6 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mish ...

CVSS3: 7.8
EPSS: Высокий
github логотип

GHSA-87j5-gppq-mq6h

около 3 лет назад

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME.

CVSS3: 7.8
EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2019:3263-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3248-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3225-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP4)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2411

почти 6 лет назад

ELSA-2019-2411: kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3261-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3260-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3249-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP1)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3247-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3232-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3230-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3224-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3258-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3246-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 8 for SLE 15)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3228-1

больше 5 лет назад

Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2020-01891

Уязвимость функции ptrace_link ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

CVSS3: 7.8
80%
Высокий
почти 6 лет назад
ubuntu логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
80%
Высокий
почти 6 лет назад
redhat логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
80%
Высокий
почти 6 лет назад
nvd логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

CVSS3: 7.8
80%
Высокий
почти 6 лет назад
debian логотип
CVE-2019-13272

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mish ...

CVSS3: 7.8
80%
Высокий
почти 6 лет назад
github логотип
GHSA-87j5-gppq-mq6h

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME.

CVSS3: 7.8
80%
Высокий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2019:3263-1

Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3248-1

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3225-1

Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP4)

больше 5 лет назад
oracle-oval логотип
ELSA-2019-2411

ELSA-2019-2411: kernel security update (IMPORTANT)

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3261-1

Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3260-1

Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3249-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP1)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3247-1

Security update for the Linux Kernel (Live Patch 9 for SLE 15)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3232-1

Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3230-1

Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3224-1

Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP4)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3258-1

Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3246-1

Security update for the Linux Kernel (Live Patch 8 for SLE 15)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3228-1

Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3)

больше 5 лет назад

Уязвимостей на страницу