kernel is vulnerable to privilege escalation. The vulnerability exists due to a race condition in the SCTP sockets net/sctp/socket.c
which allows an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.
www.openwall.com/lists/oss-security/2021/05/10/1
www.openwall.com/lists/oss-security/2021/05/10/2
www.openwall.com/lists/oss-security/2021/05/10/3
www.openwall.com/lists/oss-security/2021/05/10/4
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2021-23133
lists.debian.org/debian-lts-announce/2021/06/msg00019.html
lists.debian.org/debian-lts-announce/2021/06/msg00020.html
lists.fedoraproject.org/archives/list/[email protected]/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/
lists.fedoraproject.org/archives/list/[email protected]/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/
lists.fedoraproject.org/archives/list/[email protected]/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/
security.netapp.com/advisory/ntap-20210611-0008/
www.openwall.com/lists/oss-security/2021/04/18/2