An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinuxptracetraceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access the subjective credentials of another task.
[
{
"deprecated": false,
"target": {
"file": "security/smack/smack_lsm.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@a3727a8bac0a9e77c70820655fd8715523ba3db7",
"digest": {
"line_hashes": [
"247655449890717799414474569618701453069",
"252367730954087374881456882148349232688",
"23922003542645291426456130070641861105",
"71961584147433219908231846896884561176",
"35525355652169658808748223954838914346",
"61444230526333087372665734953864578019",
"53347689819794540429362882057008179651",
"51629158701563314062574267890337866774"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2021-43057-d2d252b3"
},
{
"deprecated": false,
"target": {
"file": "security/selinux/hooks.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@a3727a8bac0a9e77c70820655fd8715523ba3db7",
"digest": {
"line_hashes": [
"267929273751863202740485016059911595906",
"51722539158143691860376063160129271806",
"224311037755870724313506271124005100926",
"267393955703760775934884423542275326062",
"273861831860440601610278382144936552214",
"42842610731588986524546274933984883912",
"32067559146929014521078656491470522812",
"265285103183519278358230077590877995474"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2021-43057-d6060bfd"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-43057.json"