{"id":"CVE-2021-33655","details":"When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.","aliases":["A-240019719","ASB-A-240019719"],"modified":"2026-03-15T22:40:53.159302Z","published":"2022-07-18T15:15:07.990Z","related":["ALSA-2023:2148","ALSA-2023:2458","ALSA-2023:2736","ALSA-2023:2951","SUSE-SU-2022:2719-1","SUSE-SU-2022:2720-1","SUSE-SU-2022:2721-1","SUSE-SU-2022:2722-1","SUSE-SU-2022:2723-1","SUSE-SU-2022:2741-1","SUSE-SU-2022:2803-1","SUSE-SU-2022:2808-1","SUSE-SU-2022:2809-1","SUSE-SU-2022:2827-1","SUSE-SU-2022:2840-1","SUSE-SU-2022:2875-1","SUSE-SU-2022:2875-2","SUSE-SU-2022:2892-1","SUSE-SU-2022:2892-2","SUSE-SU-2022:2910-1","SUSE-SU-2022:4024-1","SUSE-SU-2022:4027-1","SUSE-SU-2022:4033-1","SUSE-SU-2022:4035-1","SUSE-SU-2022:4100-1","SUSE-SU-2022:4112-1","SUSE-SU-2022:4113-1","SUSE-SU-2022:4129-1","SUSE-SU-2023:0416-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5191"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2022/07/19/2"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.19"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-33655.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}