Количество 32
Количество 32

CVE-2021-23133
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVE-2021-23133
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVE-2021-23133
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVE-2021-23133
CVE-2021-23133
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) befo ...

SUSE-SU-2021:2460-1
Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP5)

SUSE-SU-2021:2384-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)

SUSE-SU-2021:2366-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2)
GHSA-hp5q-cmxv-w64v
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

BDU:2021-04855
Уязвимость компонента net/sctp/socket.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

SUSE-SU-2021:2453-1
Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP5)

SUSE-SU-2021:2387-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2)

SUSE-SU-2021:2361-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)

SUSE-SU-2021:2332-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)

SUSE-SU-2021:2377-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)

SUSE-SU-2021:2367-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15)

SUSE-SU-2021:2344-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1)
ELSA-2021-9351
ELSA-2021-9351: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9349
ELSA-2021-9349: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9307
ELSA-2021-9307: Unbreakable Enterprise kernel-container security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-23133 A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. | CVSS3: 6.7 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-23133 A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. | CVSS3: 7 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-23133 A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. | CVSS3: 6.7 | 0% Низкий | около 4 лет назад |
![]() | CVSS3: 7 | 0% Низкий | около 4 лет назад | |
CVE-2021-23133 A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) befo ... | CVSS3: 6.7 | 0% Низкий | около 4 лет назад | |
![]() | SUSE-SU-2021:2460-1 Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP5) | 0% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:2384-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3) | 0% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:2366-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) | 0% Низкий | почти 4 года назад | |
GHSA-hp5q-cmxv-w64v A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. | CVSS3: 7 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2021-04855 Уязвимость компонента net/sctp/socket.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7 | 0% Низкий | около 4 лет назад |
![]() | SUSE-SU-2021:2453-1 Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP5) | почти 4 года назад | ||
![]() | SUSE-SU-2021:2387-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) | почти 4 года назад | ||
![]() | SUSE-SU-2021:2361-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) | почти 4 года назад | ||
![]() | SUSE-SU-2021:2332-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1) | почти 4 года назад | ||
![]() | SUSE-SU-2021:2377-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) | почти 4 года назад | ||
![]() | SUSE-SU-2021:2367-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15) | почти 4 года назад | ||
![]() | SUSE-SU-2021:2344-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1) | почти 4 года назад | ||
ELSA-2021-9351 ELSA-2021-9351: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-9349 ELSA-2021-9349: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-9307 ELSA-2021-9307: Unbreakable Enterprise kernel-container security update (IMPORTANT) | около 4 лет назад |
Уязвимостей на страницу