{"id":"CVE-2022-29021","details":"A buffer overflow vulnerability exists in the razerkbd driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.","modified":"2026-03-15T14:47:11.798126Z","published":"2022-05-20T13:15:15.430Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/04/msg00032.html"},{"type":"EVIDENCE","url":"https://github.com/openrazer/openrazer/pull/1790"},{"type":"EVIDENCE","url":"https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openrazer/openrazer","events":[{"introduced":"0"},{"last_affected":"122b4d5a67058754e05efd72f0f487c5f1aca9b0"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.3.0"}]}}],"versions":["v1.0.0","v1.0.10","v1.0.11","v1.0.12","v1.0.13","v1.0.17","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.0.7-2","v1.0.8","v1.0.9","v1.1.0","v1.1.1","v1.1.10","v1.1.11","v1.1.12","v1.1.13","v1.1.14","v1.1.15","v1.1.16","v1.1.2","v1.1.3","v1.1.5","v1.1.6","v1.1.7","v1.1.8","v1.1.9","v2.0.0","v2.1","v2.1.1","v2.2.0","v2.2.1","v2.2.2","v2.3.0","v2.3.1","v2.4.0","v2.5.0","v2.6.0","v2.7.0","v2.8.0","v2.9.0","v3.0.0","v3.0.1","v3.1.0","v3.2.0","v3.3.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-29021.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}