summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-43389
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-11-04 22:02:39 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2021-11-04 22:02:39 +0100
commit1610036070ec1b23763673fa26967b8f5f1a7b1b (patch)
tree57821f6d0355533747c3cf248d5e89730cf38e85 /active/CVE-2021-43389
parenta4ee1253898e00e9a4ca58d46b6293286eb1c757 (diff)
CVE-2021-3896 rejected in favour of CVE-2021-43389
Diffstat (limited to 'active/CVE-2021-43389')
-rw-r--r--active/CVE-2021-4338917
1 files changed, 17 insertions, 0 deletions
diff --git a/active/CVE-2021-43389 b/active/CVE-2021-43389
new file mode 100644
index 00000000..503db38f
--- /dev/null
+++ b/active/CVE-2021-43389
@@ -0,0 +1,17 @@
+Description: isdn: cpai: check ctr->cnr to avoid array index out of bound
+References:
+ https://www.openwall.com/lists/oss-security/2021/10/19/1
+ https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
+Notes:
+ carnil> Fixed as well in 5.14.15 in 5.14.y.
+ bwh> This seems to really be a bug in the Bluetooth CMTP subsystem, which has
+ bwh> been present since that was added in Linux 2.6.2.
+Bugs:
+upstream: released (5.15-rc6) [1f3e2e97c003f80c4b087092b225c8787ff91e4d]
+5.10-upstream-stable: released (5.10.76) [7f221ccbee4ec662e2292d490a43ce6c314c4594]
+4.19-upstream-stable: released (4.19.214) [7d91adc0ccb060ce564103315189466eb822cc6a]
+4.9-upstream-stable: released (4.9.288) [24219a977bfe3d658687e45615c70998acdbac5a]
+sid: released (5.14.16-1)
+5.10-bullseye-security: needed
+4.19-buster-security: needed
+4.9-stretch-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy