A potential security vulnerability in the Safestring library maintained by Intel® may allow escalation of privilege. Intel is releasing a library update to mitigate this potential vulnerability.
CVEID: CVE-2021-33106****
Description: Integer overflow in the Safestring library maintained by Intel® may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Safestring library maintained by Intel® before commit id efbd4066ea215f03342c1f0e5888102badf14477 Date: Thu Jul 22 09:15:47 2021 +0300.
Intel recommends updating the Safestring library to commit id efbd4066ea215f03342c1f0e5888102badf14477 Date: Thu Jul 22 09:15:47 2021 +0300 or later.
Updates are available for download at this location: <https://github.com/intel/safestringlib>
Intel would like to thank Guy Acosta, Microsoft Corporation for reporting this issue.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.