diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2021-11-04 22:02:39 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2021-11-04 22:02:39 +0100 |
commit | 1610036070ec1b23763673fa26967b8f5f1a7b1b (patch) | |
tree | 57821f6d0355533747c3cf248d5e89730cf38e85 /active/CVE-2021-43389 | |
parent | a4ee1253898e00e9a4ca58d46b6293286eb1c757 (diff) |
CVE-2021-3896 rejected in favour of CVE-2021-43389
Diffstat (limited to 'active/CVE-2021-43389')
-rw-r--r-- | active/CVE-2021-43389 | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/active/CVE-2021-43389 b/active/CVE-2021-43389 new file mode 100644 index 00000000..503db38f --- /dev/null +++ b/active/CVE-2021-43389 @@ -0,0 +1,17 @@ +Description: isdn: cpai: check ctr->cnr to avoid array index out of bound +References: + https://www.openwall.com/lists/oss-security/2021/10/19/1 + https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/ +Notes: + carnil> Fixed as well in 5.14.15 in 5.14.y. + bwh> This seems to really be a bug in the Bluetooth CMTP subsystem, which has + bwh> been present since that was added in Linux 2.6.2. +Bugs: +upstream: released (5.15-rc6) [1f3e2e97c003f80c4b087092b225c8787ff91e4d] +5.10-upstream-stable: released (5.10.76) [7f221ccbee4ec662e2292d490a43ce6c314c4594] +4.19-upstream-stable: released (4.19.214) [7d91adc0ccb060ce564103315189466eb822cc6a] +4.9-upstream-stable: released (4.9.288) [24219a977bfe3d658687e45615c70998acdbac5a] +sid: released (5.14.16-1) +5.10-bullseye-security: needed +4.19-buster-security: needed +4.9-stretch-security: needed |