First published: Mon Apr 12 2021(Updated: )
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.
Credit: psirt@paloaltonetworks.com psirt@paloaltonetworks.com psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.rt7.130.el8 | 0:4.18.0-348.rt7.130.el8 |
redhat/kernel | <0:4.18.0-348.el8 | 0:4.18.0-348.el8 |
redhat/Kernel | <5.12 | 5.12 |
Linux Kernel | >=4.10<4.14.232 | |
Linux Kernel | >=4.15<4.19.189 | |
Linux Kernel | >=4.20<5.4.114 | |
Linux Kernel | >=5.5<5.10.32 | |
Linux Kernel | >=5.11<5.11.16 | |
Fedora | =32 | |
Fedora | =33 | |
Fedora | =34 | |
Debian | =9.0 | |
NetApp Cloud Backup | ||
NetApp SolidFire & HCI Management Node | ||
Broadcom Fabric Operating System | ||
All of | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
All of | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
All of | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700S | ||
NetApp H700S | ||
All of | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
All of | ||
NetApp H500E | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700E | ||
NetApp H700E | ||
All of | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
All of | ||
NetApp SolidFire Baseboard Management Controller Firmware | ||
NetApp SolidFire | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
NetApp H700S | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
NetApp H500E | ||
NetApp H500e Firmware | ||
NetApp H700E | ||
NetApp H700E | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
NetApp SolidFire Baseboard Management Controller Firmware | ||
NetApp SolidFire | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.
This issue is fixed in Linux kernel 5.12-rc8.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23133 has a high severity rating due to the potential for kernel privilege escalation.
To resolve CVE-2021-23133, upgrade to the kernel versions 0:4.18.0-348.rt7.130.el8 or 0:4.18.0-348.el8 on Red Hat systems.
CVE-2021-23133 affects Linux kernel versions prior to 5.12-rc8, including several versions between 4.10 and 5.11.
CVE-2021-23133 is classified as a race condition vulnerability in SCTP sockets of the Linux kernel.
Yes, CVE-2021-23133 can potentially be exploited by unprivileged users or network services to escalate their privileges.