SB2024021921 - Integer overflow in Linux kernel
Published: February 19, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2021-33631)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow when mounting a malicious filesystem. A local user can mount a specially crafted filesystem, trigger an integer overflow and execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://gitee.com/src-openeuler/kernel/pulls/1389
- https://gitee.com/src-openeuler/kernel/pulls/1396
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8
- http://www.openwall.com/lists/oss-security/2024/01/30/3
- http://www.openwall.com/lists/oss-security/2024/01/30/4
- http://www.openwall.com/lists/oss-security/2024/01/30/5
- http://www.openwall.com/lists/oss-security/2024/01/30/9
- http://www.openwall.com/lists/oss-security/2024/01/30/10
- http://www.openwall.com/lists/oss-security/2024/01/31/3
- http://www.openwall.com/lists/oss-security/2024/01/31/2
- http://www.openwall.com/lists/oss-security/2024/02/02/6
- http://www.openwall.com/lists/oss-security/2024/02/02/9
- http://www.openwall.com/lists/oss-security/2024/02/03/1