vulnerability
Amazon Linux AMI 2: CVE-2021-41073: Security patch for kernel, kernel-livepatch-5.10.50-44.131, kernel-livepatch-5.10.50-44.132, kernel-livepatch-5.10.59-52.142, kernel-livepatch-5.10.62-55.141 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Sep 19, 2021 | Nov 5, 2021 | Nov 26, 2024 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Sep 19, 2021
Added
Nov 5, 2021
Modified
Nov 26, 2024
Description
loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.
Solutions
amazon-linux-ami-2-upgrade-bpftoolamazon-linux-ami-2-upgrade-bpftool-debuginfoamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-50-44-131amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-50-44-131-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-50-44-132amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-50-44-132-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-59-52-142amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-59-52-142-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-62-55-141amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-62-55-141-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-68-62-173amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.