CVE-2021-43057Use After Free in Kernel

CWE-416Use After Free8 documents7 sources
Severity
7.8HIGHNVD
OSV3.3
EPSS
0.1%
top 64.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 28
Latest updateMay 24

Description

An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access the subjective credentials of another task.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-h3xq-35q6-gh9g: An issue was discovered in the Linux kernel before 52022-05-24
OSV
linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem-5.13, linux-oracle, linux-raspi vulnerabilities2021-11-30
OSV
CVE-2021-43057: An issue was discovered in the Linux kernel before 52021-10-28

📋Vendor Advisories

4
Ubuntu
Linux kernel vulnerabilities2021-11-30
Microsoft
An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corr2021-10-12
Red Hat
kernel: use-after-free in the SELinux handler for PTRACE_TRACEME2021-09-23
Debian
CVE-2021-43057: linux - An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in s...2021