{"id":"ASB-A-195082750", "published":"2021-12-01T00:00:00Z", "modified":"2026-04-17T15:55:28.020024152Z", "aliases":["CVE-2021-33909", "A-195082750"], "details":"fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "affected":[{"package":{"name":":linux_kernel:", "ecosystem":"Android"}, "ranges":[{"type":"ECOSYSTEM", "events":[{"introduced":":0"}, {"fixed":":2021-12-05"}]}], "versions":["Kernel"], "ecosystem_specific":{"fixes":["https://android.googlesource.com/kernel/common/+/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"], "severity":"High", "spl":"2021-12-05", "types":["EoP"], "vanir_signatures":[{"deprecated":false, "digest":{"line_hashes":["74254866291374402956710747649521950744", "80765060961419181796369186824257428641", "30272898263732629582390626314069094611", "249931424290703359451893110809274264261"], "threshold":0.9}, "id":"ASB-A-195082750-98f75c34", "signature_type":"Line", "signature_version":"v1", "source":"https://android.googlesource.com/kernel/common/+/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b", "target":{"file":"fs/seq_file.c"}}, {"deprecated":false, "digest":{"function_hash":"33647813340154487149123856384192856444", "length":101}, "id":"ASB-A-195082750-da83d170", "signature_type":"Function", "signature_version":"v1", "source":"https://android.googlesource.com/kernel/common/+/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b", "target":{"file":"fs/seq_file.c", "function":"seq_buf_alloc"}}]}}], "references":[{"type":"ADVISORY", "url":"https://source.android.com/security/bulletin/2021-12-01"}, {"type":"FIX", "url":"https://android.googlesource.com/kernel/common/+/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"}]}