#VU63385 Improper Validation of Array Index in Linux kernel


Published: 2022-05-18 | Updated: 2022-05-25

Vulnerability identifier: #VU63385

Vulnerability risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-43389

CWE-ID:

Exploitation vector: Local

Exploit availability:

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor:

Description
The vulnerability allows a local user to execute arbitrary code with elevated privileges.

The vulnerability exists due to improper validation of array index in the ISDN CAPI implementation within detach_capi_ctr() function in drivers/isdn/capi/kcapi.c. local user can send specially crafted data to the system and execute arbitrary code with elevated privileges.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
http://seclists.org/oss-sec/2021/q4/39
http://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
http://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
http://bugzilla.redhat.com/show_bug.cgi?id=2013180
http://www.openwall.com/lists/oss-security/2021/11/05/1
http://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
http://www.debian.org/security/2022/dsa-5096
http://lists.debian.org/debian-lts-announce/2022/03/msg00012.html


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability