Логотип exploitDog
bind:"CVE-2021-33033" OR bind:"CVE-2021-32399" OR bind:"CVE-2021-23133" OR bind:"CVE-2021-33034"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-33033" OR bind:"CVE-2021-32399" OR bind:"CVE-2021-23133" OR bind:"CVE-2021-33034"

Количество 99

Количество 99

rocky логотип

RLSA-2021:2714

почти 4 года назад

Important: kernel security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9793

почти 3 года назад

ELSA-2022-9793: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2714

почти 4 года назад

ELSA-2021-2714: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3655-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3641-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3748-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3655-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3641-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3723-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3675-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1477-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1460-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3675-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2021-23133

около 4 лет назад

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 6.7
EPSS: Низкий
redhat логотип

CVE-2021-23133

около 4 лет назад

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2021-23133

около 4 лет назад

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 6.7
EPSS: Низкий
msrc логотип

CVE-2021-23133

около 4 лет назад

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2021-23133

около 4 лет назад

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) befo ...

CVSS3: 6.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14849-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2021-33034

около 4 лет назад

In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2021:2714

Important: kernel security and bug fix update

почти 4 года назад
oracle-oval логотип
ELSA-2022-9793

ELSA-2022-9793: kernel security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2021-2714

ELSA-2021-2714: kernel security and bug fix update (IMPORTANT)

почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2021:3655-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:3641-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3748-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3655-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3641-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3723-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:3675-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1477-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1460-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3675-1

Security update for the Linux Kernel

больше 3 лет назад
ubuntu логотип
CVE-2021-23133

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 6.7
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-23133

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 7
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-23133

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 6.7
0%
Низкий
около 4 лет назад
msrc логотип
CVSS3: 7
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-23133

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) befo ...

CVSS3: 6.7
0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:14849-1

Security update for the Linux Kernel

больше 3 лет назад
ubuntu логотип
CVE-2021-33034

In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.

CVSS3: 7.8
0%
Низкий
около 4 лет назад

Уязвимостей на страницу