{"uuid": "e34cbcab-fb43-4541-93a1-be0540d9dcd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-33909", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/55", "content": "Sequoia: A Local Privilege Escalation Vulnerability in Linux\u2019s Filesystem Layer (CVE-2021-33909)\n\ud83d\udc64 by Bharat Jogi\n\n\"The Qualys Research Team has discovered a size_t-to-int type conversion vulnerability in the Linux Kernel\u2019s filesystem layer affecting most Linux operating systems. Any unprivileged user can gain root privileges on a vulnerable host by exploiting this vulnerability in a default configuration.\"\n\n\ud83d\udcdd Contents:\n \u2022 About Linux Filesystem\n \u2022 Impact\n \u2022 Disclosure Timeline\n \u2022 Proof of Concept Video\n \u2022 Technical Details\n \u2022 Solution\n \u2022 Qualys Coverage\n \u2022 Dashboard\n \u2022 Vendor References\n \u2022 Frequently Asked Questions (FAQs)\n\nhttps://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/sequoia-a-local-privilege-escalation-vulnerability-in-linuxs-filesystem-layer-cve-2021-33909", "creation_timestamp": "2021-07-21T15:39:08.000000Z"}