21st November 2024

New Linux Kernel Vulnerability – CVE-2021-33910,CVE-2021-33909

The vulnerability, discovered by Qualys researchers, tracked as CVE-2021-33909, resides in the filesystem layer used to manage user data, a feature universally used by all Linux operating systems. According to Qualys’ research, the vulnerability affects all Linux kernel versions released since 2014.

By exploiting this vulnerability, attackers can gain root privileges on many current distributions. “Using these vulnerabilities, we obtained root privileges on default installations of Ubuntu 20.04, Ubuntu 20.10, Ubuntu 21.04, Debian 11 and Fedora 34 Workstation,” the researchers said in a statement.

Qualys also announced on 21.07.2021 that it discovered a “stack exhaustion denial-of-service vulnerability” in systemd, tracked as CVE-2021-33910, which can be exploited by unprivileged attackers to trigger a kernel panic. This vulnerability was present in all released versions of the systemd since it was announced in April 2015. Earlier this year, Qualys researchers also found a “sudo” vulnerability that could allow local users to gain “root” privileges on Unix-like operating systems without requiring authentication.

New Linux Kernel Vulnerability
New Linux Kernel Vulnerability

 

Solution Offers and CVE / CWE

Given the breadth of the attack surface for this vulnerability, Qualys recommends that users immediately apply patches for this vulnerability.

If you are not a customer, you can start your free Qualys VMDR trial to get full access to QIDs for CVE-2021-33909 to update your vulnerable assets.

CVE/CWE:CVE-2021-33910,CVE-2021-33909

Reference:

https://nvd.nist.gov/vuln/detail/CVE-2021-33910

https://www.bleepingcomputer.com/

https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt

LEARN MORE  What is the Difference Between apt-get update/upgrade/dist-upgrade and How is it Used?

Leave a Reply

Your email address will not be published. Required fields are marked *