fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
References
Link Providers
http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html cve-icon cve-icon
http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html cve-icon cve-icon
http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html cve-icon cve-icon
http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/07/22/7 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/08/25/10 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/09/17/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/09/17/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/09/21/1 cve-icon cve-icon
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b cve-icon
https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-33909 cve-icon
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20210819-0004/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-33909 cve-icon
https://www.debian.org/security/2021/dsa-4941 cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2021/07/20/1 cve-icon cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2021-07-20T18:01:34

Updated: 2024-08-04T00:05:52.143Z

Reserved: 2021-06-07T00:00:00

Link: CVE-2021-33909

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-20T19:15:09.747

Modified: 2024-11-21T06:09:45.353

Link: CVE-2021-33909

cve-icon Redhat

Severity : Important

Publid Date: 2021-07-20T12:00:00Z

Links: CVE-2021-33909 - Bugzilla