7.8
CVSSv3

CVE-2021-33909

Published: 20/07/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 644
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

fs/seq_file.c in the Linux kernel 3.16 up to and including 5.13.x prior to 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

fedoraproject fedora 34

debian debian linux 9.0

debian debian linux 10.0

netapp solidfire -

netapp hci management node -

oracle communications session border controller 8.3

oracle communications session border controller 8.4

oracle communications session border controller 9.0

oracle communications session border controller 8.2

sonicwall sma1000_firmware

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2020-36311 A flaw was discovered in the KVM subsystem for AMD CPUs, allowing an attacker to cause a denial of service by triggering destruction of a large SEV VM CVE-2021-3609 Norber ...
An out-of-bounds write flaw was found in the Linux kernel's seq_file in the Filesystem layer This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash or a leak of internal kernel information The issue results from not validating the size_t-to-int conversion prior to performing operat ...
Severity Unknown Remote Unknown Type Unknown Description AVG-1879 linux 5131arch1-1 Medium Vulnerable ...
An out-of-bounds write flaw was found in the Linux kernel's seq_file in the Filesystem layer This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash or a leak of internal kernel information The issue results from not validating the size_t-to-int conversion prior to performing operat ...
ALAS2LIVEPATCH-2021-056 Amazon Linux 2 Security Advisory: ALASLIVEPATCH-2021-056 Advisory Release Date: 2021-07-21 00:55 P ...
ALAS2LIVEPATCH-2021-055 Amazon Linux 2 Security Advisory: ALASLIVEPATCH-2021-055 Advisory Release Date: 2021-07-21 00:55 P ...
An out-of-bounds write flaw was found in the Linux kernel's seq_file in the Filesystem layer This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash or a leak of internal kernel information The issue results from not validating the size_t-to-int conversion prior to performing operat ...
An out-of-bounds write flaw was found in the Linux kernel's seq_file in the Filesystem layer This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash or a leak of internal kernel information The issue results from not validating the size_t-to-int conversion prior to performing operat ...
ALAS2LIVEPATCH-2021-059 Amazon Linux 2 Security Advisory: ALASLIVEPATCH-2021-059 Advisory Release Date: 2021-07-21 01:13 P ...
ALAS2LIVEPATCH-2021-058 Amazon Linux 2 Security Advisory: ALASLIVEPATCH-2021-058 Advisory Release Date: 2021-07-21 00:56 P ...
ALAS2LIVEPATCH-2021-057 Amazon Linux 2 Security Advisory: ALASLIVEPATCH-2021-057 Advisory Release Date: 2021-07-21 00:56 P ...

Exploits

Qualys discovered a size_t-to-int conversion vulnerability in the Linux kernel's filesystem layer: by creating, mounting, and deleting a deep directory structure whose total path length exceeds 1GB, an unprivileged local attacker can write the 10-byte string "//deleted" to an offset of exactly -2GB-10B below the beginning of a vmalloc()ated kernel ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: Containers-optimized OS (COS) membership in the linux-distros list <!--X-Subject-Header-End--> <!--X-Head-of-Message--> ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: Containers-optimized OS (COS) membership in the linux-distros list <!--X-Subject-Header-End--> <!--X-Head-of-Message--> ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer <!--X-Subject-Header-End--> <!--X-Head-of-Message- ...

Github Repositories

Exploit code for CVE-2021-33909,Just a dump of removed https://github.com/AmIAHuman/ repo

CVE-2021-33909 Exploit code for CVE-2021-33909,Just a dump of removed githubcom/AmIAHuman/ repo Sequoia (CVE-2021-33909) Building gcc exploitc -o exploit Running "mkdir dir;/exploit $(pwd)/dir" chmod +x exploit /exploit One-Liner gcc exploitc -o exploit;chmod +x exploit;/exploit Credits blogqualyscom/vulnerabilities-threat-research/2021/07/20/

CodeQL workshop for C/C++: Integer conversion This workshop is adapted from this material In this workshop we will explore integer conversion, how it is represented by the standard library, and how it to relates to type conversion security vulnerabilities Contents CodeQL workshop for C/C++: Integer conversion Contents Prerequisites and setup instructions Workshop Learnings

Sequoia exploit (7/20/21)

Sequoia (CVE-2021-33909) Building gcc exploitc -o exploit Running chmod +x exploit /exploit One-Liner gcc exploitc -o exploit;chmod +x exploit;/exploit Credits blogqualyscom/vulnerabilities-threat-research/2021/07/20/sequoia-a-local-privilege-escala

This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing vulnerable functions during runtime

Kernel runtime fix of CVE-2021-33909 This repository builds an out-of-tree module named "cve-2021-33909ko" cve-2021-33909 fixes an issue in the kernels filesystem layer by kprobe-replacing vulnerable functions during runtime It can be build via "make", setting KDIR to the kernels (source-/header-)directory It can be loaded directly via "insmod cve-2

LinuxVulnerabilities Sequoia Local Priv Escalation - LPE security flaw CVE-2021-33909 (wwwqualyscom/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linuxtxt) wwwbleepingcomputercom/news/security/new-linux-kernel-bug-lets-you-get-root-on-most-modern-distros/

Deep directories in containers The depth of directory trees is not bounded in some container platforms This allows a maliicious container processes to create directory trees that, depending on platform and system resources, can exhaust available memory when traversing, making removal difficult without manual intervention Demo Create a pod that creates a very deep series of ne

some interesting exploit articles

exploit_articles CVE-2021-22555: Turning \x00\x00 into 10000$ Meet WiFiDemon – iOS WiFi RCE 0-Day Vulnerability, and a Zero-Click Vulnerability That Was Silently Patched How to mitigate CVE-2021-33909 Sequoia with Falco – Linux filesystem privilege escalation vulnerability Bypassing Image Load Kernel Callbacks Privilege escalation with polkit: How to get root

Testing static and dynamic security checks of integer related bugs in GCC & Clang

Overview Integer bugs are interesting and the root of A LOT of problems in this world Can we cause them to crash or detect them at compile time? Below is a list of interesting things to look for Unsigned and signed integer overflows are two different stories Clang can do both dynamically but GCC cannot Floats do not have any sort of dynamic protection on overflows tldr;

CVE-2021-33909 Sequoia

CVE-2021-33909 Sequoia Writeup gcc exploitc -o exploit -lpthread -DBLOCK_VIA_USERFAULTFD gcc exploithelloc -o exploithello -lpthread -lfuse -D_FILE_OFFSET_BITS=64 $ mkdir dir $ /exploit $(pwd)/dir # id

References

CWE-787CWE-190https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53bhttps://www.openwall.com/lists/oss-security/2021/07/20/1https://lists.debian.org/debian-lts-announce/2021/07/msg00016.htmlhttps://lists.debian.org/debian-lts-announce/2021/07/msg00015.htmlhttps://lists.debian.org/debian-lts-announce/2021/07/msg00014.htmlhttps://www.debian.org/security/2021/dsa-4941http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.htmlhttp://www.openwall.com/lists/oss-security/2021/07/22/7http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.htmlhttps://security.netapp.com/advisory/ntap-20210819-0004/http://www.openwall.com/lists/oss-security/2021/08/25/10http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.htmlhttp://www.openwall.com/lists/oss-security/2021/09/17/2http://www.openwall.com/lists/oss-security/2021/09/17/4http://www.openwall.com/lists/oss-security/2021/09/21/1http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.htmlhttps://www.oracle.com/security-alerts/cpujan2022.htmlhttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/https://nvd.nist.govhttps://www.debian.org/security/2021/dsa-4941https://github.com/bbinfosec43/CVE-2021-33909https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-07