Linux Distros 未修補弱點:CVE-2021-23133

high Nessus Plugin ID 223635

概要

Linux/Unix 主機上安裝的一個或多個套件存有弱點,供應商表示將不會修補。

說明

Linux/Unix 主機上安裝了一個或多個受到弱點影響的套件,且供應商未提供可用的修補程式。

- 在 5.12-rc8 版之前的 Linux 核心 SCTP 通訊端 (net/sctp/socket.c) 中有一個爭用弱點,可導致核心權限從網路服務內容或無權限的處理程序提升。如果在沒有 sock_net(sk)->sctp.addr_wq_lock 的情況下呼叫 sctp_destroy_sock,則會在沒有任何適當鎖定的情況下,從 auto_asconf_splist 清單中移除元素。如果附加了拒絕建立某些 SCTP 通訊端的 BPF_CGROUP_INET_SOCK_CREATE,具有網路服務權限的攻擊者便可利用此弱點,升級至 root 權限或從無權限使用者的內容直接提升權限。(CVE-2021-23133)

請注意,Nessus 依賴供應商報告的套件存在。

解決方案

目前尚未有已知的解決方案。

另請參閱

https://access.redhat.com/security/cve/cve-2021-23133

https://ubuntu.com/security/CVE-2021-23133

Plugin 詳細資訊

嚴重性: High

ID: 223635

檔案名稱: unpatched_CVE_2021_23133.nasl

版本: 1.3

類型: local

代理程式: unix

系列: Misc.

已發布: 2025/3/4

已更新: 2025/9/2

支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

風險資訊

VPR

風險因素: High

分數: 7.4

CVSS v2

風險因素: Medium

基本分數: 6.9

時間性分數: 5.4

媒介: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2021-23133

CVSS v3

風險因素: High

基本分數: 7

時間性分數: 6.3

媒介: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: cpe:/o:canonical:ubuntu_linux:20.04:-:lts, cpe:/o:canonical:ubuntu_linux:24.04:-:lts, p-cpe:/a:redhat:enterprise_linux:kernel-doc, p-cpe:/a:canonical:ubuntu_linux:linux-aws-5.3, p-cpe:/a:centos:centos:kernel-debug-devel, p-cpe:/a:centos:centos:kernel-kdump-devel, p-cpe:/a:centos:centos:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm, p-cpe:/a:canonical:ubuntu_linux:linux-hwe, p-cpe:/a:centos:centos:kernel-rt-doc, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:centos:centos:kernel-kdump, p-cpe:/a:canonical:ubuntu_linux:linux-aws-5.0, p-cpe:/a:canonical:ubuntu_linux:linux-oem-5.6, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, p-cpe:/a:centos:centos:kernel-abi-whitelists, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace, p-cpe:/a:redhat:enterprise_linux:kernel-headers, cpe:/o:centos:centos:7, p-cpe:/a:canonical:ubuntu_linux:linux-raspi-realtime, p-cpe:/a:centos:centos:kernel-debug, p-cpe:/a:canonical:ubuntu_linux:linux-azure-fde-5.19, p-cpe:/a:canonical:ubuntu_linux:linux-intel-iot-realtime, p-cpe:/a:canonical:ubuntu_linux:linux-oracle-5.3, p-cpe:/a:canonical:ubuntu_linux:linux-hwe-edge, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:canonical:ubuntu_linux:linux-gke-4.15, p-cpe:/a:redhat:enterprise_linux:kernel-rt, p-cpe:/a:centos:centos:perf, p-cpe:/a:centos:centos:kernel-rt-debug-kvm, p-cpe:/a:centos:centos:bpftool, p-cpe:/a:canonical:ubuntu_linux:linux-azure-edge, p-cpe:/a:centos:centos:kernel-rt-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:centos:centos:kernel, p-cpe:/a:centos:centos:kernel-rt-trace-devel, p-cpe:/a:canonical:ubuntu_linux:linux-riscv, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug, p-cpe:/a:centos:centos:python-perf, p-cpe:/a:centos:centos:kernel-rt-devel, p-cpe:/a:centos:centos:kernel-bootwrapper, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-devel, p-cpe:/a:redhat:enterprise_linux:kernel-bootwrapper, p-cpe:/a:canonical:ubuntu_linux:linux-realtime, p-cpe:/a:redhat:enterprise_linux:python-perf, p-cpe:/a:canonical:ubuntu_linux:linux-raspi2, p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists, p-cpe:/a:canonical:ubuntu_linux:linux-gcp-edge, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel, p-cpe:/a:centos:centos:kernel-rt-trace-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-doc, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs, p-cpe:/a:redhat:enterprise_linux:perf, p-cpe:/a:canonical:ubuntu_linux:linux-oracle-5.0, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel, p-cpe:/a:centos:centos:kernel-headers, p-cpe:/a:redhat:enterprise_linux:bpftool, p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-tools, p-cpe:/a:centos:centos:kernel-tools-libs-devel, p-cpe:/a:canonical:ubuntu_linux:linux-oem, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel, p-cpe:/a:canonical:ubuntu_linux:linux-gcp, p-cpe:/a:centos:centos:kernel-rt-kvm, p-cpe:/a:canonical:ubuntu_linux:linux-azure, p-cpe:/a:centos:centos:kernel-rt, p-cpe:/a:centos:centos:kernel-tools, p-cpe:/a:redhat:enterprise_linux:kernel-kdump, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, p-cpe:/a:centos:centos:kernel-rt-trace, p-cpe:/a:canonical:ubuntu_linux:linux-gcp-5.3, p-cpe:/a:centos:centos:kernel-rt-debug, p-cpe:/a:centos:centos:kernel-doc, p-cpe:/a:canonical:ubuntu_linux:linux-azure-5.3, p-cpe:/a:centos:centos:kernel-tools-libs

必要的 KB 項目: Host/OS/identifier, Host/cpu, Host/local_checks_enabled, global_settings/vendor_unpatched

可被惡意程式利用: true

可輕鬆利用: Exploits are available

弱點發布日期: 2021/4/13

參考資訊

CVE: CVE-2021-23133