CVE-2021-43057 — Use After Free in Kernel
Severity
7.8HIGHNVD
OSV3.3
EPSS
0.1%
top 64.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 28
Latest updateMay 24
Description
An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access the subjective credentials of another task.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages5 packages
Patches
🔴Vulnerability Details
3📋Vendor Advisories
4Microsoft▶
An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corr↗2021-10-12
Debian▶
CVE-2021-43057: linux - An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in s...↗2021