CVE-2019-13272
时间: 2023-10-04 11:07:45 浏览: 179
CVE-2019-13272 exp
CVE-2019-13272是一个Linux内核漏洞,该漏洞存在于ptrace_link函数中。这个函数在Linux执行PTRACE_TRACEME函数时,会获得对父进程凭据的RCU引用,并将该引用指向get_cred函数。然而,由于struct cred对象的生存周期规则,不允许无条件地将RCU引用转换为稳定引用。这个漏洞可以被利用来以特权身份执行恶意代码或提升权限。
关于该漏洞的更多详细信息和修复情况,请参考以下链接: <span class="em">1</span><span class="em">2</span><span class="em">3</span>
#### 引用[.reference_title]
- *1* [Linux本地内核提权漏洞复现(CVE-2019-13272)](https://blog.csdn.net/m0_48520508/article/details/112799843)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 50%"]
- *2* *3* [CVE-2019-13272Linux本地内核提权](https://blog.csdn.net/fageweiketang/article/details/103482899)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 50%"]
[ .reference_list ]
阅读全文