First published: Tue Apr 20 2021(Updated: )
A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.10.0 | 3.10.0 |
Linux Kernel | <=5.14.13 | |
Fedora | =33 | |
Fedora | =34 | |
Fedora | =35 | |
Debian | =9.0 | |
StarWind SAN & NAS | =v8r12 | |
StarWind Virtual SAN | =v8r13-14338 | |
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Exposure Function | =22.1.1 | |
Oracle Communications Cloud Native Core Policy | =22.2.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42739 has a high severity rating due to its potential to enable privilege escalation and system crashes.
To mitigate CVE-2021-42739, you should update to the fixed versions of the Linux kernel, specifically 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.128-1, 6.12.12-1, or 6.12.13-1.
CVE-2021-42739 affects various distributions of the Linux kernel, specifically versions up to 5.14.13 and kernel packages from Red Hat and Debian.
CVE-2021-42739 is a local vulnerability, meaning that exploitation requires a local user to have access to the host system.
Exploiting CVE-2021-42739 may lead to privilege escalation, allowing an attacker to gain elevated permissions and potentially take control of the system.