In Linux kernel, the CVE-2021-4439 vulnerability resolves an array index out of bounds issue in isdn module
| Reporter | Title | Published | Views | Family All 624 |
|---|---|---|---|---|
| Astra Linux - уязвимость в linux, linux-5.10 | 31 Oct 202516:38 | – | astralinux | |
| kernel: Fix of 13 CVEs | 7 Oct 202410:36 | – | cloudlinux | |
| CVE-2021-4439 isdn: cpai: check ctr->cnr to avoid array index out of bound | 20 Jun 202412:07 | – | cvelist | |
| CVE-2021-4439 | 20 Jun 202412:15 | – | debiancve | |
| CVE-2021-4439 | 20 Jun 202412:15 | – | nvd | |
| openSUSE Security Advisory (SUSE-SU-2024:2394-1) | 12 Jul 202400:00 | – | openvas | |
| openSUSE Security Advisory (SUSE-SU-2024:2372-1) | 12 Jul 202400:00 | – | openvas | |
| openSUSE: Security Advisory for the Linux Kernel (SUSE-SU-2024:2362-1) | 12 Jul 202400:00 | – | openvas | |
| openSUSE Security Advisory (SUSE-SU-2024:2939-1) | 25 Feb 202500:00 | – | openvas | |
| SUSE: Security Advisory (SUSE-SU-2024:2360-1) | 10 Jul 202400:00 | – | openvas |
[
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"drivers/isdn/capi/kcapi.c"
],
"versions": [
{
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"lessThan": "e8b8de17e164c9f1b7777f1c6f99d05539000036",
"status": "affected",
"versionType": "git"
},
{
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"lessThan": "24219a977bfe3d658687e45615c70998acdbac5a",
"status": "affected",
"versionType": "git"
},
{
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"lessThan": "9b6b2db77bc3121fe435f1d4b56e34de443bec75",
"status": "affected",
"versionType": "git"
},
{
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"lessThan": "7d91adc0ccb060ce564103315189466eb822cc6a",
"status": "affected",
"versionType": "git"
},
{
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"lessThan": "285e9210b1fab96a11c0be3ed5cea9dd48b6ac54",
"status": "affected",
"versionType": "git"
},
{
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"lessThan": "7f221ccbee4ec662e2292d490a43ce6c314c4594",
"status": "affected",
"versionType": "git"
},
{
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"lessThan": "cc20226e218a2375d50dd9ac14fb4121b43375ff",
"status": "affected",
"versionType": "git"
},
{
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"lessThan": "1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "affected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"drivers/isdn/capi/kcapi.c"
],
"versions": [
{
"version": "4.4.290",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.9.288",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.14.253",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.19.214",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.4.156",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.10.76",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.14.15",
"lessThanOrEqual": "5.14.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.15",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
]
}
]Data
Build on a solid foundation with Vulners data
We provide the essential building blocks for cybersecurity solutions with comprehensive, structured, and constantly updated vulnerability and exploits data
Api
Power your application with Vulners API
The Vulners REST API offers reliable, high-performance access to vulnerability intelligence, with 99.9% SLA uptime and CDN-backed data delivery for seamless global access
App
Assess and manage vulnerabilities with Vulners tools
Built on top of Vulners' database and SDK, end-user solutions give security professionals and developers lightweight and powerful tools for vulnerability remediation