Количество 99
Количество 99

RLSA-2021:2714
Important: kernel security and bug fix update
ELSA-2022-9793
ELSA-2022-9793: kernel security update (IMPORTANT)
ELSA-2021-2714
ELSA-2021-2714: kernel security and bug fix update (IMPORTANT)

openSUSE-SU-2021:3655-1
Security update for the Linux Kernel

openSUSE-SU-2021:3641-1
Security update for the Linux Kernel

SUSE-SU-2021:3748-1
Security update for the Linux Kernel

SUSE-SU-2021:3655-1
Security update for the Linux Kernel

SUSE-SU-2021:3641-1
Security update for the Linux Kernel

SUSE-SU-2021:3723-1
Security update for the Linux Kernel

openSUSE-SU-2021:3675-1
Security update for the Linux Kernel

openSUSE-SU-2021:1477-1
Security update for the Linux Kernel

openSUSE-SU-2021:1460-1
Security update for the Linux Kernel

SUSE-SU-2021:3675-1
Security update for the Linux Kernel

CVE-2021-23133
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVE-2021-23133
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVE-2021-23133
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVE-2021-23133
CVE-2021-23133
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) befo ...

SUSE-SU-2021:14849-1
Security update for the Linux Kernel

CVE-2021-33034
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | RLSA-2021:2714 Important: kernel security and bug fix update | почти 4 года назад | ||
ELSA-2022-9793 ELSA-2022-9793: kernel security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2021-2714 ELSA-2021-2714: kernel security and bug fix update (IMPORTANT) | почти 4 года назад | |||
![]() | openSUSE-SU-2021:3655-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:3641-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3748-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3655-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3641-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3723-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:3675-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:1477-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:1460-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3675-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | CVE-2021-23133 A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. | CVSS3: 6.7 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-23133 A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. | CVSS3: 7 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-23133 A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. | CVSS3: 6.7 | 0% Низкий | около 4 лет назад |
![]() | CVSS3: 7 | 0% Низкий | около 4 лет назад | |
CVE-2021-23133 A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) befo ... | CVSS3: 6.7 | 0% Низкий | около 4 лет назад | |
![]() | SUSE-SU-2021:14849-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | CVE-2021-33034 In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value. | CVSS3: 7.8 | 0% Низкий | около 4 лет назад |
Уязвимостей на страницу