vulnerability
Ubuntu: USN-5162-1 (CVE-2021-43057): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Oct 28, 2021 | Mar 22, 2023 | Mar 22, 2023 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Oct 28, 2021
Added
Mar 22, 2023
Modified
Mar 22, 2023
Description
An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access the subjective credentials of another task.
Solution(s)
ubuntu-upgrade-linux-image-5-13-0-1006-kvmubuntu-upgrade-linux-image-5-13-0-1007-awsubuntu-upgrade-linux-image-5-13-0-1007-gcpubuntu-upgrade-linux-image-5-13-0-1008-azureubuntu-upgrade-linux-image-5-13-0-1010-oracleubuntu-upgrade-linux-image-5-13-0-1011-raspiubuntu-upgrade-linux-image-5-13-0-1011-raspi-nolpaeubuntu-upgrade-linux-image-5-13-0-1020-oemubuntu-upgrade-linux-image-5-13-0-22-genericubuntu-upgrade-linux-image-5-13-0-22-generic-64kubuntu-upgrade-linux-image-5-13-0-22-generic-lpaeubuntu-upgrade-linux-image-5-13-0-22-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-virtual

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.