CVE-2021-33909
moderate-risk
Published 2021-07-20
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
Do I need to act?
~
2.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (11)
References (40)
Third Party Advisory
http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LS...
Third Party Advisory
http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LS...
Third Party Advisory
http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LS...
Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210819-0004/
Third Party Advisory
https://www.debian.org/security/2021/dsa-4941
and 20 more references
45
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
5/34 · Minimal
Exposure
16/34 · Moderate