
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-4439 is a vulnerability in the Linux kernel's ISDN CAPI subsystem, specifically in the detachcapictr() function. The vulnerability was discovered and disclosed in June 2024, affecting various Linux kernel versions. The issue occurs when the cmtpaddconnection() function adds a CMTP session to a controller and runs a kernel thread to process CMTP (Red Hat).
The vulnerability is an array-index-out-of-bounds bug in the drivers/isdn/capi/kcapi.c file. It occurs when the kernel thread calls detachcapictr() to detach a register controller that hasn't been attached yet. The bug manifests when ctr->cnr is invalid, leading to an out-of-bounds array access. The CVSS v3.1 score is 5.1 (AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H), indicating a low to moderate severity (Red Hat).
The vulnerability can lead to array index out of bounds access in the Linux kernel's ISDN CAPI subsystem. This could potentially result in local privilege escalation or system crashes, though the high privileges required for exploitation limit its impact (Red Hat).
The vulnerability has been patched in the Linux kernel by adding additional checks for ctr->cnr validity before accessing the array. The fix involves checking if ctr->cnr is less than 1 or if ctr->cnr - 1 is greater than or equal to CAPI_MAXCONTR (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."