A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Broadcom
Subscribe
|
Brocade Fabric Operating System
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Linux
Subscribe
|
Linux Kernel
Subscribe
|
|
Netapp
Subscribe
|
Cloud Backup
Subscribe
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410c
Subscribe
H410c Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Solidfire \& Hci Management Node
Subscribe
Solidfire Baseboard Management Controller
Subscribe
Solidfire Baseboard Management Controller Firmware
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2689-1 | linux security update |
Debian DLA |
DLA-2690-1 | linux-4.19 security update |
EUVD |
EUVD-2021-10251 | A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. |
Ubuntu USN |
USN-4997-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4997-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-4999-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5000-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5000-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-5001-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5003-1 | Linux kernel vulnerabilities |
Fixes
Solution
This issue is fixed in Linux kernel 5.12-rc8.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-16T19:04:20.684Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-23133
No data.
Status : Modified
Published: 2021-04-22T18:15:08.123
Modified: 2024-11-21T05:51:16.080
Link: CVE-2021-23133
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN