

This occurs because of an attempt to access the subjective credentials of another task.Īn issue was discovered in the Linux kernel for powerpc before 5.14.15. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.Īn issue was discovered in the Linux kernel before 5.14.8. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.Īn issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. An issue was discovered in the Linux kernel before 5.14.15.
