An out-of-bounds write flaw was found in the Linux kernel’s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash or a leak of internal kernel information. The issue results from not validating the size_t-to-int conversion prior to performing operations.
From PCI DSS point of views, primary concerns are operating system user account security. Verification on the necessities of allowing access given to System, restrict only the mandatory rights to login with logging, ePBF etc. Patch management, especially critical, should be complete in 30 days.
Verify Operating System vendors have releasing relate patch and complete patch update within 1 month. If there are no updates from the vendors, necessary mitigation process should be in place. Patch updates resolving this vulnerability (CVE-2021-33909) noted by Qualys Security Research Team, see following form for Patch listing:
| Source | Risk level |
|---|---|
| NESSUS https://www.tenable.com/cve/CVE-2021-33909 | CVSS (v2) 7.2 |
| NIST NVD https://nvd.nist.gov/vuln/detail/CVE-2021-33909 | CVSS (v3) 7.8 |
| Redhat https://access.redhat.com/security/cve/cve-2021-33909 | CVSS (v3) 7.0 |
| CVE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909 | Source: MITRE |
Update on 2021/09/10
Qualys Security Research Team has proven vulnerability by accessing root rights in vulnerable OS of : Ubuntu 20.04、Ubuntu 20.10、Ubuntu 21.04、Debian 11 and Fedora 34 Workstation. Other Linux OS may result in I.O.C. generate from this vulnerability. Linux Servers patch fix as follow:
| Operating System | Security patch link |
|---|---|
| Redhat | https://access.redhat.com/security/cve/cve-2021-33909 |
| CentOS | https://centosfaq.org/centos/its-been-six-days-since-cvd-2021-33909-was-patched-in-rhel-whats-the-holdup-for-stream-8/
https://centos.pkgs.org/8-stream/centos-baseos-x86_64/kernel-4.18.0-326.el8.x86_64.rpm.html |
| SUSE | https://www.suse.com/security/cve/CVE-2021-33909.html |
| ubuntu | https://ubuntu.com/security/CVE-2021-33909 |
Update on 2021/09/10
If there are no updates from the vendors, necessary mitigation process should be in place.
sysctl kernel.unprivileged_userns_clone=1 # unprivileged_userns_clone set as 0
sysctl kernel.unprivileged_bpf_disabled=1 # unprivileged_bpf_disabled set as 1
For technical details, please refer to below link:
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt

Max Tsai
• Payment Card Industry Security, IT Security Management, Cloud Service Management
• Professional certification: PCI DSS QSA, CISSP, ISMS LA
Secure Vectors Information Technologies Inc., is a consulting firm specialized in providing payment card related security consulting and assessment services. We provide comprehensive payment card related security consulting and certification services, including PCI DSS, PCI 3DS, PCI PIN Security Standards. Also providing personal data protection, GDPR compliance inspection and other consulting services. Headquartered in California, U.S., and with branch offices in Taiwan (Taipei), China (Beijing and Hunan), Vietnam (Hanoi), and Singapore. With over 70 percent market share in Taiwan and 8 years experiences in PCI compliance, we developed compliance management program and collaborating services to fit every business.
- PCI certification: securevectors.com
- SecuCollab collaborating service: secucollab.com
- SecuCompliance management program: www.secucompliance.com
You might also like
https://i0.wp.com/www.securevectors.com/wp-content/uploads/2025/10/ENG-1-scaled.jpg?fit=2560%2C1919&ssl=1
1919
2560
Andrew
https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
Andrew2025-10-21 14:10:182025-10-22 14:34:49Secure Vectors Accredited as a PCI DSS Approved Scanning Vendor (ASV)
https://i0.wp.com/www.securevectors.com/wp-content/uploads/2025/07/en-scaled.jpg?fit=2560%2C1919&ssl=1
1919
2560
Andrew
https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
Andrew2025-07-15 11:28:552025-07-15 13:48:26🔒 Microsoft Issues Major Security Update – 130 Vulnerabilities Patched!
https://i0.wp.com/www.securevectors.com/wp-content/uploads/2024/05/PCI-DSS-v4.0-%E6%84%8F%E8%B1%A1%E5%9C%96-%E6%96%B9%E7%89%88.jpg?fit=960%2C663&ssl=1
663
960
arthur.li
https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
arthur.li2024-06-23 18:33:272024-08-29 16:28:28Who need PCI DSS Compliance?
https://i0.wp.com/www.securevectors.com/wp-content/uploads/2024/06/News-0830.png?fit=838%2C628&ssl=1
628
838
arthur.li
https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
arthur.li2024-06-23 14:40:452025-05-20 10:55:51PCI DSS Compliance for dummies
https://i0.wp.com/www.securevectors.com/wp-content/uploads/2024/06/PCI-DSS-SAQ-type_EN.png?fit=2882%2C2122&ssl=1
2122
2882
arthur.li
https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
arthur.li2024-06-21 18:15:032025-07-18 15:42:11What is your SAQ Type?
https://i0.wp.com/www.securevectors.com/wp-content/uploads/2023/12/PCI-DSS-v4.0-%E6%84%8F%E8%B1%A1%E5%9C%96-%E6%96%B9%E7%89%88_EN.jpg?fit=960%2C663&ssl=1
663
960
arthur.li
https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
arthur.li2023-09-15 16:00:522024-09-08 10:48:18How to meet the additional requirement for Service Provider only by PCI DSS v4.0 provision 12.4.2?
https://i0.wp.com/www.securevectors.com/wp-content/uploads/2023/08/2023-08-01-%E6%BC%8F%E6%B4%9E%E4%BF%AE%E8%A3%9C%E6%84%8F%E8%B1%A1%E5%9C%96-%E6%96%B9%E7%89%88_En.jpg?fit=960%2C720&ssl=1
720
960
arthur.li
https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
arthur.li2023-08-15 17:43:242024-09-08 10:48:28[GCP] Be careful using GCP’s CI/CD service Google Cloud Build!
https://i0.wp.com/www.securevectors.com/wp-content/uploads/2023/07/20230725-EN-%E6%96%B9%E7%89%88.jpg?fit=1280%2C960&ssl=1
960
1280
arthur.li
https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
arthur.li2023-07-31 11:01:212023-07-31 11:02:29【FortiOS】SSL-VPN Major Security Vulnerability (CVE-2023-27997) Have you fixed it?
https://i0.wp.com/www.securevectors.com/wp-content/uploads/2021/10/Immediate-Response-Required-Windows-1011-CVE-2021-36934-Security-Vulnerabilities.png?fit=1200%2C628&ssl=1
628
1200
arthur.li
https://www.securevectors.com/wp-content/uploads/2024/02/logo.svg
arthur.li2021-10-13 17:53:542021-11-01 11:38:53Immediate Response Required: Windows 10/11 (CVE-2021-36934) Security Vulnerabilities*For more information and inquiries please kindly email us at service@securevectors.com , our experts will answer all your questions as soon as possible.

