CVE-2021-23133

CVE Details

Release Date:2021-04-22
Impact:None What is this?

Description


A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

See more information about CVE-2021-23133 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 7.0
Vector String: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.0
Attack Vector: Local
Attack Complexity: High
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 7 (kernel-uek)ELSA-2021-93062021-06-15
Oracle Linux version 7 (kernel-uek)ELSA-2021-93492021-07-12
Oracle Linux version 7 (kernel-uek)ELSA-2021-93622021-07-16
Oracle Linux version 7 (kernel-uek-container)ELSA-2021-93072021-06-15
Oracle Linux version 7 (kernel-uek-container)ELSA-2021-93512021-07-12
Oracle Linux version 7 (kernel-uek-container)ELSA-2021-93632021-07-16
Oracle Linux version 8 (kernel)ELSA-2021-43562021-11-16
Oracle Linux version 8 (kernel-uek)ELSA-2021-93062021-06-15
Oracle Linux version 8 (kernel-uek)ELSA-2021-93622021-07-16
Oracle Linux version 8 (kernel-uek-container)ELSA-2021-93072021-06-15
Oracle Linux version 8 (kernel-uek-container)ELSA-2021-93632021-07-16


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete