First published: Thu Jun 10 2021(Updated: )
An out-of-bounds write flaw was found in the Linux kernel's seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.41.2.el6 | 0:2.6.32-754.41.2.el6 |
redhat/kernel-rt | <0:3.10.0-1160.36.2.rt56.1179.el7 | 0:3.10.0-1160.36.2.rt56.1179.el7 |
redhat/kernel | <0:3.10.0-1160.36.2.el7 | 0:3.10.0-1160.36.2.el7 |
redhat/kernel | <0:3.10.0-327.98.2.el7 | 0:3.10.0-327.98.2.el7 |
redhat/kernel | <0:3.10.0-514.90.2.el7 | 0:3.10.0-514.90.2.el7 |
redhat/kernel | <0:3.10.0-693.90.2.el7 | 0:3.10.0-693.90.2.el7 |
redhat/kernel | <0:3.10.0-957.78.2.el7 | 0:3.10.0-957.78.2.el7 |
redhat/kernel | <0:3.10.0-1062.52.2.el7 | 0:3.10.0-1062.52.2.el7 |
redhat/kernel-rt | <0:4.18.0-305.10.2.rt7.83.el8_4 | 0:4.18.0-305.10.2.rt7.83.el8_4 |
redhat/kernel | <0:4.18.0-305.10.2.el8_4 | 0:4.18.0-305.10.2.el8_4 |
redhat/kernel | <0:4.18.0-147.51.2.el8_1 | 0:4.18.0-147.51.2.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.60.2.rt13.112.el8_2 | 0:4.18.0-193.60.2.rt13.112.el8_2 |
redhat/kernel | <0:4.18.0-193.60.2.el8_2 | 0:4.18.0-193.60.2.el8_2 |
redhat/redhat-virtualization-host | <0:4.3.17-20210713.0.el7_9 | 0:4.3.17-20210713.0.el7_9 |
redhat/redhat-virtualization-host | <0:4.4.7-20210715.1.el8_4 | 0:4.4.7-20210715.1.el8_4 |
redhat/kernel | <5.14 | 5.14 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Android | ||
Linux Kernel | >=3.12.43<3.13 | |
Linux Kernel | >=3.16<4.4.276 | |
Linux Kernel | >=4.5<4.9.276 | |
Linux Kernel | >=4.10<4.14.240 | |
Linux Kernel | >=4.15<4.19.198 | |
Linux Kernel | >=4.20<5.4.134 | |
Linux Kernel | >=5.5<5.10.52 | |
Linux Kernel | >=5.11<5.12.19 | |
Linux Kernel | >=5.13<5.13.4 | |
Fedora | =34 | |
Debian | =9.0 | |
Debian | =10.0 | |
netapp hci management node | ||
netapp solidfire | ||
Oracle Communications Session Border Controller | =8.2 | |
Oracle Communications Session Border Controller | =8.3 | |
Oracle Communications Session Border Controller | =8.4 | |
Oracle Communications Session Border Controller | =9.0 | |
All of | ||
sonicwall sma1000 firmware | <=12.4.2-02044 | |
SonicWall SMA1000 Appliances | ||
sonicwall sma1000 firmware | <=12.4.2-02044 | |
SonicWall SMA1000 Appliances | ||
IBM Data Risk Manager | <=2.0.6 |
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-33909 is classified as a high severity vulnerability that allows local privilege escalation due to an out-of-bounds write flaw in the Linux kernel.
To mitigate CVE-2021-33909, users should update to the recommended kernel versions provided by their Linux distribution.
CVE-2021-33909 can lead to system crashes, leakage of internal kernel information, and privilege escalation for local attackers.
CVE-2021-33909 is not exploitable remotely as it requires local user privileges to be exploited.
CVE-2021-33909 affects various versions of the Linux kernel, specifically those prior to the patched versions listed by the respective distributions.