CVE-2021-33656

When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:huawei:openeuler:20.03:-:*:*:lts:*:*:*
cpe:2.3:o:huawei:openeuler:20.03:sp1:*:*:lts:*:*:*
cpe:2.3:o:huawei:openeuler:20.03:sp3:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:09

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/07/19/3 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/07/19/3 - Mailing List, Patch, Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch - Patch, Third Party Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html - Mailing List, Third Party Advisory
References () https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-33656&packageName=kernel - Third Party Advisory () https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-33656&packageName=kernel - Third Party Advisory

Information

Published : 2022-07-18 15:15

Updated : 2024-11-21 06:09


NVD link : CVE-2021-33656

Mitre link : CVE-2021-33656

CVE.ORG link : CVE-2021-33656


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel

huawei

  • openeuler
CWE
CWE-787

Out-of-bounds Write