Bugzilla – Bug 1192260
VUL-0: CVE-2021-43057: kernel-source-azure,kernel-source-rt,kernel-source: use-after-free in the SELinux handler for PTRACE_TRACEME
Last modified: 2024-06-25 16:25:38 UTC
An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges. This occurs because of an attempt to access the subjective credentials of another task. Reference: https://bugs.chromium.org/p/project-zero/issues/detail?id=2229 Upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3727a8bac0a9e77c70820655fd8715523ba3db7 References: https://bugzilla.redhat.com/show_bug.cgi?id=2019163 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43057 https://bugs.chromium.org/p/project-zero/issues/detail?id=2229 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43057 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3727a8bac0a9e77c70820655fd8715523ba3db7
Only SLE15-SP4 and stable contains the two offending commits (eb1231f73c4d, 1fb057dcde11) and also contains the fixing commit a3727a8bac0a9e77c70820655fd8715523ba3db7.
FYI, we usually update the patch reference tags. So will do for SLE15-SP4 branch, at least.