An out-of-bounds write flaw was found in the Linux kernel’s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash or a leak of internal kernel information. The issue results from not validating the size_t-to-int conversion prior to performing operations.
From PCI DSS point of views, primary concerns are operating system user account security.  Verification on the necessities of allowing access given to System, restrict only the mandatory rights to login with logging, ePBF etc. Patch management, especially critical, should be complete in 30 days.
Verify Operating System vendors have releasing relate patch and complete patch update within 1 month.  If there are no updates from the vendors, necessary mitigation process should be in place. Patch updates resolving this vulnerability (CVE-2021-33909) noted by Qualys Security Research Team, see following form for Patch listing:
| Source | Risk level | 
|---|---|
| NESSUS https://www.tenable.com/cve/CVE-2021-33909  | CVSS (v2) 7.2 | 
| NIST NVD https://nvd.nist.gov/vuln/detail/CVE-2021-33909  | CVSS (v3) 7.8 | 
| Redhat https://access.redhat.com/security/cve/cve-2021-33909  | CVSS (v3) 7.0 | 
| CVE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909  | Source: MITRE | 
Update on 2021/09/10
Qualys Security Research Team has proven vulnerability by accessing root rights in vulnerable OS of : Ubuntu 20.04、Ubuntu 20.10、Ubuntu 21.04、Debian 11 and Fedora 34 Workstation.  Other Linux OS may result in I.O.C. generate from this vulnerability.  Linux Servers patch fix as follow:
| Operating System | Security patch link | 
|---|---|
| Redhat | https://access.redhat.com/security/cve/cve-2021-33909 | 
| CentOS | https://centosfaq.org/centos/its-been-six-days-since-cvd-2021-33909-was-patched-in-rhel-whats-the-holdup-for-stream-8/
 https://centos.pkgs.org/8-stream/centos-baseos-x86_64/kernel-4.18.0-326.el8.x86_64.rpm.html  | 
| SUSE | https://www.suse.com/security/cve/CVE-2021-33909.html | 
| ubuntu | https://ubuntu.com/security/CVE-2021-33909 | 
Update on 2021/09/10
If there are no updates from the vendors, necessary mitigation process should be in place.
sysctl kernel.unprivileged_userns_clone=1 # unprivileged_userns_clone set as 0
sysctl kernel.unprivileged_bpf_disabled=1 # unprivileged_bpf_disabled set as 1
For technical details, please refer to below link:
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt

Max Tsai
• Payment Card Industry Security, IT Security Management, Cloud Service Management
• Professional certification: PCI DSS QSA, CISSP, ISMS LA
Secure Vectors Information Technologies Inc., is a consulting firm specialized in providing payment card related security consulting and assessment services. We provide comprehensive payment card related security consulting and certification services, including PCI DSS, PCI 3DS, PCI PIN Security Standards. Also providing personal data protection, GDPR compliance inspection and other consulting services. Headquartered in California, U.S., and with branch offices in Taiwan (Taipei), China (Beijing and Hunan), Vietnam (Hanoi), and Singapore. With over 70 percent market share in Taiwan and 8 years experiences in PCI compliance, we developed compliance management program and collaborating services to fit every business.
- PCI certification: securevectors.com
 - SecuCollab collaborating service: secucollab.com
 - SecuCompliance management program: www.secucompliance.com
 
You might also like
				
						https://i0.wp.com/www.securevectors.com/wp-content/uploads/2025/10/ENG-1-scaled.jpg?fit=2560%2C1919&ssl=1
						1919
						2560
				
				
						Andrew
						
							https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
						
				Andrew2025-10-21 14:10:182025-10-22 14:34:49Secure Vectors Accredited as a PCI DSS Approved Scanning Vendor (ASV)
				
						https://i0.wp.com/www.securevectors.com/wp-content/uploads/2025/07/en-scaled.jpg?fit=2560%2C1919&ssl=1
						1919
						2560
				
				
						Andrew
						
							https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
						
				Andrew2025-07-15 11:28:552025-07-15 13:48:26🔒 Microsoft Issues Major Security Update – 130 Vulnerabilities Patched!
				
						https://i0.wp.com/www.securevectors.com/wp-content/uploads/2024/05/PCI-DSS-v4.0-%E6%84%8F%E8%B1%A1%E5%9C%96-%E6%96%B9%E7%89%88.jpg?fit=960%2C663&ssl=1
						663
						960
				
				
						arthur.li
						
							https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
						
				arthur.li2024-06-23 18:33:272024-08-29 16:28:28Who need PCI DSS Compliance?
				
						https://i0.wp.com/www.securevectors.com/wp-content/uploads/2024/06/News-0830.png?fit=838%2C628&ssl=1
						628
						838
				
				
						arthur.li
						
							https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
						
				arthur.li2024-06-23 14:40:452025-05-20 10:55:51PCI DSS Compliance for dummies
				
						https://i0.wp.com/www.securevectors.com/wp-content/uploads/2024/06/PCI-DSS-SAQ-type_EN.png?fit=2882%2C2122&ssl=1
						2122
						2882
				
				
						arthur.li
						
							https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
						
				arthur.li2024-06-21 18:15:032025-07-18 15:42:11What is your SAQ Type?
				
						https://i0.wp.com/www.securevectors.com/wp-content/uploads/2023/12/PCI-DSS-v4.0-%E6%84%8F%E8%B1%A1%E5%9C%96-%E6%96%B9%E7%89%88_EN.jpg?fit=960%2C663&ssl=1
						663
						960
				
				
						arthur.li
						
							https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
						
				arthur.li2023-09-15 16:00:522024-09-08 10:48:18How to meet the additional requirement for Service Provider only by PCI DSS v4.0 provision 12.4.2?
				
						https://i0.wp.com/www.securevectors.com/wp-content/uploads/2023/08/2023-08-01-%E6%BC%8F%E6%B4%9E%E4%BF%AE%E8%A3%9C%E6%84%8F%E8%B1%A1%E5%9C%96-%E6%96%B9%E7%89%88_En.jpg?fit=960%2C720&ssl=1
						720
						960
				
				
						arthur.li
						
							https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
						
				arthur.li2023-08-15 17:43:242024-09-08 10:48:28[GCP] Be careful using GCP’s CI/CD service Google Cloud Build!
				
						https://i0.wp.com/www.securevectors.com/wp-content/uploads/2023/07/20230725-EN-%E6%96%B9%E7%89%88.jpg?fit=1280%2C960&ssl=1
						960
						1280
				
				
						arthur.li
						
							https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
						
				arthur.li2023-07-31 11:01:212023-07-31 11:02:29【FortiOS】SSL-VPN Major Security Vulnerability (CVE-2023-27997) Have you fixed it?
				
						https://i0.wp.com/www.securevectors.com/wp-content/uploads/2021/10/Immediate-Response-Required-Windows-1011-CVE-2021-36934-Security-Vulnerabilities.png?fit=1200%2C628&ssl=1
						628
						1200
				
				
						arthur.li
						
							https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
						
				arthur.li2021-10-13 17:53:542021-11-01 11:38:53Immediate Response Required: Windows 10/11 (CVE-2021-36934) Security Vulnerabilities*For more information and inquiries please kindly email us at service@securevectors.com , our experts will answer all your questions as soon as possible.
													
