In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Linux Kernel Subscribe
Active Iq Unified Manager Subscribe
Aff A700s Subscribe
Aff A700s Firmware Subscribe
E-series Performance Analyzer Subscribe
E-series Santricity Os Controller Subscribe
H410c Firmware Subscribe
H610s Firmware Subscribe
Hci Compute Node Subscribe
Hci Management Node Subscribe
Service Processor Subscribe
Solidfire Subscribe
Steelstore Cloud Integrated Storage Subscribe
Enterprise Linux Subscribe
Enterprise Linux For Arm 64 Subscribe
Enterprise Linux For Ibm Z Systems Subscribe
Enterprise Linux For Real Time Subscribe
Enterprise Linux For Real Time For Nfv Subscribe
Enterprise Linux For Real Time For Nfv Tus Subscribe
Enterprise Linux For Real Time Tus Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1862-1 linux security update
Debian DLA Debian DLA DLA-1863-1 linux-4.9 security update
Debian DSA Debian DSA DSA-4484-1 linux security update
Ubuntu USN Ubuntu USN USN-4093-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4094-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4095-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4117-1 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-4118-1 Linux kernel (AWS) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html cve-icon cve-icon
http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html cve-icon cve-icon
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html cve-icon cve-icon
http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html cve-icon cve-icon
http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html cve-icon cve-icon
http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2405 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2411 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2809 cve-icon cve-icon
https://bugs.chromium.org/p/project-zero/issues/detail?id=1903 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1730895 cve-icon cve-icon
https://bugzilla.suse.com/show_bug.cgi?id=1140671 cve-icon cve-icon
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 cve-icon cve-icon
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee cve-icon cve-icon
https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-13272 cve-icon
https://seclists.org/bugtraq/2019/Jul/30 cve-icon cve-icon
https://seclists.org/bugtraq/2019/Jul/33 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190806-0001/ cve-icon cve-icon
https://support.f5.com/csp/article/K91025336 cve-icon cve-icon
https://support.f5.com/csp/article/K91025336?utm_source=f5support&amp%3Butm_medium=RSS cve-icon cve-icon
https://usn.ubuntu.com/4093-1/ cve-icon cve-icon
https://usn.ubuntu.com/4094-1/ cve-icon cve-icon
https://usn.ubuntu.com/4095-1/ cve-icon cve-icon
https://usn.ubuntu.com/4117-1/ cve-icon cve-icon
https://usn.ubuntu.com/4118-1/ cve-icon cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-13272 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-13272 cve-icon
https://www.debian.org/security/2019/dsa-4484 cve-icon cve-icon
History

Wed, 22 Oct 2025 00:15:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Tue, 04 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-12-10'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 00:30:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T23:45:33.569Z

Reserved: 2019-07-04T00:00:00.000Z

Link: CVE-2019-13272

cve-icon Vulnrichment

Updated: 2024-08-04T23:49:24.327Z

cve-icon NVD

Status : Analyzed

Published: 2019-07-17T13:15:10.687

Modified: 2025-11-06T16:51:07.910

Link: CVE-2019-13272

cve-icon Redhat

Severity : Important

Publid Date: 2019-07-16T00:00:00Z

Links: CVE-2019-13272 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses