CVE-2021-43389

An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:39

Type Values Removed Values Added
References
  • {'url': 'https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/', 'name': 'https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/ -

24 Feb 2023, 15:09

Type Values Removed Values Added
References (N/A) https://www.oracle.com/security-alerts/cpujul2022.html - (N/A) https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory
CPE cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*
First Time Oracle communications Cloud Native Core Binding Support Function
Oracle communications Cloud Native Core Policy
Oracle communications Cloud Native Core Network Exposure Function
Oracle

25 Jul 2022, 18:17

Type Values Removed Values Added
References
  • (N/A) https://www.oracle.com/security-alerts/cpujul2022.html -

05 Apr 2022, 21:02

Type Values Removed Values Added
References (MLIST) http://www.openwall.com/lists/oss-security/2021/11/05/1 - Third Party Advisory (MLIST) http://www.openwall.com/lists/oss-security/2021/11/05/1 - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2022/dsa-5096 - (DEBIAN) https://www.debian.org/security/2022/dsa-5096 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
First Time Debian
Debian debian Linux

10 Mar 2022, 17:44

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5096 -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html -

17 Dec 2021, 01:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html -

09 Nov 2021, 15:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5
CWE CWE-125
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*
References (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d - (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d - Mailing List, Patch, Third Party Advisory
References (MISC) https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 - (MISC) https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 - Mailing List, Release Notes, Third Party Advisory
References (MISC) https://seclists.org/oss-sec/2021/q4/39 - (MISC) https://seclists.org/oss-sec/2021/q4/39 - Exploit, Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/11/05/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/11/05/1 - Third Party Advisory
References (MISC) https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/ - (MISC) https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/ - Exploit, Mailing List, Third Party Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=2013180 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=2013180 - Issue Tracking, Patch, Third Party Advisory

05 Nov 2021, 18:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/11/05/1 -

04 Nov 2021, 21:15

Type Values Removed Values Added
References
  • (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=2013180 -

04 Nov 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-04 19:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-43389

Mitre link : CVE-2021-43389

CVE.ORG link : CVE-2021-43389


JSON object : View

Products Affected

redhat

  • enterprise_linux

oracle

  • communications_cloud_native_core_binding_support_function
  • communications_cloud_native_core_policy
  • communications_cloud_native_core_network_exposure_function

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read