{"id":"ASB-A-195082750","details":"fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.","aliases":["A-195082750","CVE-2021-33909"],"modified":"2026-03-11T06:13:24.619467Z","published":"2021-12-01T00:00:00Z","references":[{"type":"ADVISORY","url":"https://source.android.com/security/bulletin/2021-12-01"},{"type":"FIX","url":"https://android.googlesource.com/kernel/common/+/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"}],"affected":[{"package":{"name":":linux_kernel:","ecosystem":"Android"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":":0"},{"fixed":":2021-12-05"}]}],"versions":["Kernel"],"ecosystem_specific":{"severity":"High","vanir_signatures":[{"target":{"file":"fs/seq_file.c"},"signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["74254866291374402956710747649521950744","80765060961419181796369186824257428641","30272898263732629582390626314069094611","249931424290703359451893110809274264261"]},"signature_type":"Line","deprecated":false,"source":"https://android.googlesource.com/kernel/common/+/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b","id":"ASB-A-195082750-98f75c34"},{"target":{"function":"seq_buf_alloc","file":"fs/seq_file.c"},"signature_version":"v1","digest":{"function_hash":"33647813340154487149123856384192856444","length":101},"signature_type":"Function","deprecated":false,"source":"https://android.googlesource.com/kernel/common/+/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b","id":"ASB-A-195082750-da83d170"}],"types":["EoP"],"spl":"2021-12-05","fixes":["https://android.googlesource.com/kernel/common/+/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"]},"database_specific":{"source":"https://storage.googleapis.com/android-osv-test/ASB-A-195082750.json"}}],"schema_version":"1.7.5"}