PT-2021-3879 · Linux +9 · Linux +9
Andy Nguyen
+1
·
Published
2021-04-13
·
Updated
2025-10-16
·
CVE-2021-22555
CVSS v3.1
8.3
8.3
High
Base vector | Vector | AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Linux versions prior to 2.6.19-rc1 are not specified, but versions since v2.6.19-rc1 are affected.
Description
The issue is related to a heap out-of-bounds write in the netfilter subsystem of the Linux kernel, specifically in the net/netfilter/x tables.c file. This allows an attacker to gain privileges or cause a denial of service through user name space by exploiting the vulnerability in the xt compat target from user() function. The vulnerability can be exploited by calling compat setsockopt() with IPT SO SET REPLACE or IP6T SO SET REPLACE values set. A proof of concept exploit has been developed, which can bypass security mechanisms such as KASLR, SMAP, and SMEP, and achieve kernel code execution. The researcher who discovered the vulnerability received a $20,000 reward from Google for identifying a method to bypass container isolation in a Kubernetes cluster.
Recommendations
As a temporary workaround, consider disabling the xt compat target from user() function until a patch is available. Restrict access to the netfilter subsystem to minimize the risk of exploitation. Avoid using the compat setsockopt() function with IPT SO SET REPLACE or IP6T SO SET REPLACE values set until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
DoS
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
ALSA-2021:3057
ALSA-2021_3057
ALT-PU-2021-1706
ALT-PU-2021-1711
ALT-PU-2021-1720
ALT-PU-2021-1739
ALT-PU-2021-1763
ALT-PU-2021-1768
ALT-PU-2021-1776
ALT-PU-2021-1833
ALT-PU-2021-1862
ALT-PU-2021-1866
ALT-PU-2021-1896
ALT-PU-2021-1983
ALT-PU-2021-2671
ALT-PU-2021-3430
ALT-PU-2021-3481
BDU:2021-04260
CESA-2021_3044
CESA-2021_3057
CESA-2021_3088
CESA-2021_3327
CVE-2021-22555
ELSA-2021-3057
ELSA-2021-3327
ELSA-2021-9395
GHSA-XXX5-8MVQ-3528
LSN-0080-1
LSN-0081-1
LSN-0083-1
OESA-2021-1279
OPENSUSE-SU-2021:1076-1
OPENSUSE-SU-2021:2409-1
OPENSUSE-SU-2021:2415-1
OPENSUSE-SU-2021:2427-1
OPENSUSE-SU-2021_1076-1
OPENSUSE-SU-2021_2409-1
OPENSUSE-SU-2021_2415-1
OPENSUSE-SU-2021_2427-1
RHSA-2021:3044
RHSA-2021:3057
RHSA-2021:3088
RHSA-2021:3173
RHSA-2021:3181
RHSA-2021:3235
RHSA-2021:3321
RHSA-2021:3327
RHSA-2021:3328
RHSA-2021:3363
RHSA-2021:3375
RHSA-2021:3380
RHSA-2021:3381
RHSA-2021:3399
RHSA-2021:3477
RHSA-2021:3522
RHSA-2021:3523
RHSA-2021:3725
RHSA-2021:3812
RHSA-2021:3814
RHSA-2021_3057
RHSA-2021_3088
RHSA-2021_3327
RHSA-2021_3328
RLSA-2021:3057
RLSA-2021:3088
RLSA-2021_3057
RLSA-2021_3088
SUSE-SU-2021:2406-1
SUSE-SU-2021:2407-1
SUSE-SU-2021:2408-1
SUSE-SU-2021:2409-1
SUSE-SU-2021:2415-1
SUSE-SU-2021:2416-1
SUSE-SU-2021:2421-1
SUSE-SU-2021:2422-1
SUSE-SU-2021:2427-1
SUSE-SU-2021:2438-1
SUSE-SU-2021:2451-1
SUSE-SU-2021:2487-1
SUSE-SU-2021:2538-1
SUSE-SU-2021:2542-1
SUSE-SU-2021:2559-1
SUSE-SU-2021:2560-1
SUSE-SU-2021:2577-1
SUSE-SU-2021:2584-1
SUSE-SU-2021:2599-1
SUSE-SU-2021:2599-2
SUSE-SU-2021:2643-1
SUSE-SU-2021_2599-1
USN-5039-1
Affected Products
Alt Linux
Almalinux
Astra Linux
Centos
Linux
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu
References · 937
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/cve_2021_3490_ebpf_alu32_bounds_check_lpe.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/netfilter_xtables_heap_oob_write_priv_esc.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/cve_2022_0847_dirtypipe.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528⭐ 4211 🔗 493 · Exploit
- 🔥 https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit⭐ 1103 🔗 221 · Exploit
- 🔥 https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits⭐ 603 🔗 148 · Exploit
- 🔥 https://github.com/Bonfee/CVE-2022-25636⭐ 430 🔗 82 · Exploit
- 🔥 https://github.com/r1is/CVE-2022-0847⭐ 280 🔗 78 · Exploit
- 🔥 https://github.com/imfiver/CVE-2022-0847⭐ 280 🔗 78 · Exploit
- 🔥 https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490⭐ 302 🔗 49 · Exploit
- 🔥 https://github.com/Liang2580/CVE-2021-33909⭐ 77 🔗 62 · Exploit
- 🔥 https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md⭐ 96 🔗 13 · Exploit
- 🔥 https://github.com/Al1ex/CVE-2022-0847⭐ 80 🔗 16 · Exploit
- 🔥 https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checker⭐ 67 🔗 29 · Exploit
- 🔥 https://github.com/DataDog/dirtypipe-container-breakout-poc⭐ 78 🔗 12 · Exploit