CVE-2021-43057

Source
https://cve.org/CVERecord?id=CVE-2021-43057
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-43057.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-43057
Downstream
Published
2021-10-28T04:15:08.270Z
Modified
2026-02-11T13:24:58.764936Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinuxptracetraceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access the subjective credentials of another task.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
a3727a8bac0a9e77c70820655fd8715523ba3db7
Introduced
62fb9874f5da54fdb243003b386128037319b219
Fixed
a3727a8bac0a9e77c70820655fd8715523ba3db7

Affected versions

v5.*
v5.13
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15-rc1

Database specific

vanir_signatures
[
    {
        "deprecated": false,
        "target": {
            "file": "security/smack/smack_lsm.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@a3727a8bac0a9e77c70820655fd8715523ba3db7",
        "digest": {
            "line_hashes": [
                "247655449890717799414474569618701453069",
                "252367730954087374881456882148349232688",
                "23922003542645291426456130070641861105",
                "71961584147433219908231846896884561176",
                "35525355652169658808748223954838914346",
                "61444230526333087372665734953864578019",
                "53347689819794540429362882057008179651",
                "51629158701563314062574267890337866774"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2021-43057-d2d252b3"
    },
    {
        "deprecated": false,
        "target": {
            "file": "security/selinux/hooks.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@a3727a8bac0a9e77c70820655fd8715523ba3db7",
        "digest": {
            "line_hashes": [
                "267929273751863202740485016059911595906",
                "51722539158143691860376063160129271806",
                "224311037755870724313506271124005100926",
                "267393955703760775934884423542275326062",
                "273861831860440601610278382144936552214",
                "42842610731588986524546274933984883912",
                "32067559146929014521078656491470522812",
                "265285103183519278358230077590877995474"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2021-43057-d6060bfd"
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-43057.json"