First published: Sun Nov 07 2021(Updated: )
An issue was discovered in GNU Hurd before 0.9 20210404-9. When trying to exec a setuid executable, there's a window of time when the process already has the new privileges, but still refers to the old task and is accessible through the old process port. This can be exploited to get full root access.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Hurd | <0.9.20210404-9 | |
<0.9.20210404-9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43411 is considered to have a critical severity due to its potential for gaining full root access.
To fix CVE-2021-43411, update your GNU Hurd installation to version 0.9 20210404-9 or later.
CVE-2021-43411 affects all versions of GNU Hurd prior to 0.9 20210404-9.
The impact of CVE-2021-43411 allows an attacker to exploit a vulnerability in setuid executables to gain elevated privileges.
There are no known workarounds for CVE-2021-43411; updating to the patched version is necessary.