Логотип exploitDog
bind:"CVE-2021-23133"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-23133"

Количество 32

Количество 32

ubuntu логотип

CVE-2021-23133

около 4 лет назад

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 6.7
EPSS: Низкий
redhat логотип

CVE-2021-23133

около 4 лет назад

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2021-23133

около 4 лет назад

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 6.7
EPSS: Низкий
msrc логотип

CVE-2021-23133

около 4 лет назад

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2021-23133

около 4 лет назад

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) befo ...

CVSS3: 6.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2460-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2384-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2366-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2)

EPSS: Низкий
github логотип

GHSA-hp5q-cmxv-w64v

около 3 лет назад

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 7
EPSS: Низкий
fstec логотип

BDU:2021-04855

около 4 лет назад

Уязвимость компонента net/sctp/socket.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2453-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2387-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2361-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2332-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2377-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2367-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 24 for SLE 15)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2344-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9351

почти 4 года назад

ELSA-2021-9351: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9349

почти 4 года назад

ELSA-2021-9349: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9307

около 4 лет назад

ELSA-2021-9307: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-23133

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 6.7
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-23133

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 7
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-23133

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 6.7
0%
Низкий
около 4 лет назад
msrc логотип
CVSS3: 7
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-23133

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) befo ...

CVSS3: 6.7
0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2460-1

Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP5)

0%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:2384-1

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)

0%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:2366-1

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2)

0%
Низкий
почти 4 года назад
github логотип
GHSA-hp5q-cmxv-w64v

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

CVSS3: 7
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2021-04855

Уязвимость компонента net/sctp/socket.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7
0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2453-1

Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP5)

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:2387-1

Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2)

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:2361-1

Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:2332-1

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:2377-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:2367-1

Security update for the Linux Kernel (Live Patch 24 for SLE 15)

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:2344-1

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9351

ELSA-2021-9351: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9349

ELSA-2021-9349: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9307

ELSA-2021-9307: Unbreakable Enterprise kernel-container security update (IMPORTANT)

около 4 лет назад

Уязвимостей на страницу