CVE-2021-43057

Updated: 2024-11-24 04:09:46.570355

Description:

An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access the subjective credentials of another task.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x HIGH 7.2
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Already Fixed 2024-01-18 13:10:08
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2022-03-30 15:44:46
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2022-02-15 12:04:35
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Ignored 2022-02-21 05:39:36
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2022-03-30 15:44:46
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2022-03-30 15:44:46
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Not Vulnerable 2022-10-05 03:15:03
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Not Vulnerable 2022-02-17 08:54:38
Ubuntu 18.04 ELS linux 4.15.0 7.8 HIGH Not Vulnerable 2023-08-28 21:18:49