7

CVE-2021-23133

Exploit

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 4.10 < 4.14.232
LinuxLinux Kernel Version >= 4.15 < 4.19.189
LinuxLinux Kernel Version >= 4.20 < 5.4.114
LinuxLinux Kernel Version >= 5.5 < 5.10.32
LinuxLinux Kernel Version >= 5.11 < 5.11.16
FedoraprojectFedora Version32
FedoraprojectFedora Version33
FedoraprojectFedora Version34
DebianDebian Linux Version9.0
NetappCloud Backup Version-
NetappH410c Firmware Version-
   NetappH410c Version-
NetappH300s Firmware Version-
   NetappH300s Version-
NetappH500s Firmware Version-
   NetappH500s Version-
NetappH700s Firmware Version-
   NetappH700s Version-
NetappH300e Firmware Version-
   NetappH300e Version-
NetappH500e Firmware Version-
   NetappH500e Version-
NetappH700e Firmware Version-
   NetappH700e Version-
NetappH410s Firmware Version-
   NetappH410s Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.045
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7 1 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
psirt@paloaltonetworks.com 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

http://www.openwall.com/lists/oss-security/2021/05/10/1
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2021/05/10/2
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2021/05/10/3
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2021/05/10/4
Patch
Third Party Advisory
Mailing List
https://www.openwall.com/lists/oss-security/2021/04/18/2
Patch
Third Party Advisory
Exploit
Mailing List