A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Link | Resource |
---|---|
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/ | Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1951739 | Issue Tracking Mitigation Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
https://www.starwindsoftware.com/security/sw-20220804-0001/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2021-10-20 00:15
Updated : 2022-11-07 11:04
NVD link : CVE-2021-42739
Mitre link : CVE-2021-42739
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
oracle
- communications_cloud_native_core_network_exposure_function
- communications_cloud_native_core_binding_support_function
- communications_cloud_native_core_policy
starwindsoftware
- starwind_san_\&_nas
- starwind_virtual_san
fedoraproject
- fedora
linux
- linux_kernel
debian
- debian_linux