{"id":"CVE-2021-33200","details":"kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.","aliases":["A-190011721","PUB-A-190011721"],"modified":"2026-04-16T04:33:43.211724778Z","published":"2021-05-27T13:15:08.300Z","related":["ALSA-2021:4356","SUSE-SU-2021:1887-1","SUSE-SU-2021:1888-1","SUSE-SU-2021:1889-1","SUSE-SU-2021:1890-1","SUSE-SU-2021:1891-1","SUSE-SU-2021:1899-1","SUSE-SU-2021:1912-1","SUSE-SU-2021:1913-1","SUSE-SU-2021:1975-1","SUSE-SU-2021:1977-1","SUSE-SU-2021:2020-1","SUSE-SU-2021:2027-1","SUSE-SU-2021:2057-1","SUSE-SU-2021:2208-1","SUSE-SU-2021:2421-1","SUSE-SU-2021:2422-1","SUSE-SU-2021:2427-1","SUSE-SU-2024:0925-1","SUSE-SU-2024:0975-1","openSUSE-SU-2021:0843-1","openSUSE-SU-2021:0947-1","openSUSE-SU-2021:1975-1","openSUSE-SU-2021:1977-1","openSUSE-SU-2021:2427-1"],"references":[{"type":"WEB","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LR3OKKPHIBGOMHN476CMLW2T7UG53QX/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJCABL43FT3FKRX5DBPZG25FNKR6CEK4/"},{"type":"WEB","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"},{"type":"WEB","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210706-0004/"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2021/05/27/1"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-33200.json","unresolved_ranges":[{"events":[{"introduced":"5.4.116"},{"fixed":"5.4.123"}]},{"events":[{"introduced":"5.10.33"},{"fixed":"5.10.41"}]},{"events":[{"introduced":"5.11.17"},{"fixed":"5.12.8"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}