
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-33909 is a sizet-to-int conversion vulnerability discovered in the Linux kernel's filesystem layer, affecting versions 3.16 through 5.13.x before 5.13.4. The vulnerability was discovered by Qualys Research Labs and disclosed on July 20, 2021. The vulnerability affects the seqfile interface in the Linux kernel's filesystem layer (Qualys Advisory).
The vulnerability exists in the Linux kernel's seqfile interface which produces virtual files containing sequences of records. The issue occurs when a sizet value (64-bit unsigned integer) is passed to functions expecting an int parameter (32-bit signed integer). This conversion happens in the showmountinfo() function when handling /proc/self/mountinfo data. The vulnerability was introduced in July 2014 by commit 058504ed ('fs/seqfile: fallback to vmalloc allocation'). The issue was fixed in Linux kernel 5.13.4 with commit 8cae8cd89f05 which added a limit to seq buffer allocations (Kernel Commit).
When successfully exploited, this vulnerability allows an unprivileged local attacker to gain full root privileges on affected systems. The vulnerability has been confirmed to be exploitable on default installations of Ubuntu 20.04, Ubuntu 20.10, Ubuntu 21.04, Debian 11, and Fedora 34 Workstation. The exploit requires approximately 5GB of memory and 1M inodes (Qualys Advisory).
The primary mitigation is to update to Linux kernel version 5.13.4 or later which contains the fix. Temporary workarounds include setting /proc/sys/kernel/unprivilegedusernsclone to 0 to prevent attackers from mounting directories in user namespaces, and setting /proc/sys/kernel/unprivilegedbpfdisabled to 1 to prevent attackers from loading eBPF programs. However, these workarounds only prevent specific exploitation techniques and do not fix the underlying vulnerability (Qualys Advisory).
The vulnerability was assigned a CVSS score of 7.8 (HIGH) due to its local privilege escalation capabilities. Major Linux distributions quickly released patches, including Red Hat, Debian, and Ubuntu. The vulnerability was dubbed 'Sequoia' by Qualys and received significant attention in the security community due to its widespread impact and the detailed technical analysis provided by Qualys (Red Hat Security Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."