When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2022/07/19/2 | Mailing List Patch Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4 | Mailing List Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html | Mailing List Third Party Advisory |
| https://www.debian.org/security/2022/dsa-5191 | Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2022/07/19/2 | Mailing List Patch Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4 | Mailing List Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html | Mailing List Third Party Advisory |
| https://www.debian.org/security/2022/dsa-5191 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2022/07/19/2 - Mailing List, Patch, Third Party Advisory | |
| References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4 - Mailing List, Patch, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html - Mailing List, Third Party Advisory | |
| References | () https://www.debian.org/security/2022/dsa-5191 - Third Party Advisory |
24 Aug 2022, 16:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | (DEBIAN) https://www.debian.org/security/2022/dsa-5191 - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* |
27 Jul 2022, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
23 Jul 2022, 02:18
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CWE | CWE-787 | |
| References | (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4 - Mailing List, Patch, Vendor Advisory | |
| References | (MLIST) http://www.openwall.com/lists/oss-security/2022/07/19/2 - Mailing List, Patch, Third Party Advisory |
19 Jul 2022, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Jul 2022, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-07-18 15:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33655
Mitre link : CVE-2021-33655
CVE.ORG link : CVE-2021-33655
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
