{"api_version":"1","generated_at":"2026-04-22T21:38:47+00:00","cve":"CVE-2021-42739","urls":{"html":"https://cve.report/CVE-2021-42739","api":"https://cve.report/api/cve/CVE-2021-42739.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-42739","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-42739"},"summary":{"title":"CVE-2021-42739","description":"A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-10-20 07:15:00","updated_at":"2023-11-07 03:39:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html","name":"[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2941-1] linux-4.19 security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/","name":"https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/","refsource":"MISC","tags":[],"title":"[PATCH] media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() - Dan Carpenter","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/","name":"FEDORA-2021-8364530ebf","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 33 Update: kernel-5.14.17-101.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20211118-0001/","name":"https://security.netapp.com/advisory/ntap-20211118-0001/","refsource":"CONFIRM","tags":[],"title":"CVE-2021-42739 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/","name":"FEDORA-2021-fdef34e26f","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: kernel-5.14.17-301.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951739","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1951739","refsource":"MISC","tags":[],"title":"1951739 – (CVE-2021-42739) CVE-2021-42739 kernel: Heap buffer overflow in firedtv driver","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://seclists.org/oss-sec/2021/q2/46","name":"https://seclists.org/oss-sec/2021/q2/46","refsource":"MISC","tags":[],"title":"oss-sec: Linux kernel:  a heap buffer overflow in firedtv driver","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e","name":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e","refsource":"MISC","tags":[],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2022/dsa-5096","name":"DSA-5096","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5096-1 linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.starwindsoftware.com/security/sw-20220804-0001/","name":"https://www.starwindsoftware.com/security/sw-20220804-0001/","refsource":"MISC","tags":[],"title":"CVE-2021-42739 Linux kernel vulnerability in StarWind products","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html","name":"[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2843-1] linux security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","name":"N/A","refsource":"N/A","tags":[],"title":"Oracle Critical Patch Update Advisory - July 2022","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ%40mwanda/","name":"https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ%40mwanda/","refsource":"","tags":[],"title":"[PATCH] media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() - Dan Carpenter","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/","name":"FEDORA-2021-7de33b7016","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: kernel-5.14.17-201.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-42739","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42739","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"5.14.13","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_cloud_native_core_binding_support_function","cpe6":"22.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_cloud_native_core_network_exposure_function","cpe6":"22.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_cloud_native_core_policy","cpe6":"22.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"starwindsoftware","cpe5":"starwind_san_\\&_nas","cpe6":"v8r12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"starwindsoftware","cpe5":"starwind_virtual_san","cpe6":"v18r13","cpe7":"14338","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"starwindsoftware","cpe5":"starwind_virtual_san","cpe6":"v8r13","cpe7":"14338","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-42739","qid":"159588","title":"Oracle Enterprise Linux Security Update for kernel (ELSA-2022-0063)"},{"cve":"CVE-2021-42739","qid":"159825","title":"Oracle Enterprise Linux Security Update for kernel (ELSA-2022-1988)"},{"cve":"CVE-2021-42739","qid":"160190","title":"Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2022-9969)"},{"cve":"CVE-2021-42739","qid":"178943","title":"Debian Security Update for linux (DLA 2843-1)"},{"cve":"CVE-2021-42739","qid":"179117","title":"Debian Security Update for linux (DSA 5096-1)"},{"cve":"CVE-2021-42739","qid":"179119","title":"Debian Security Update for linux-4.19 (DLA 2941-1)"},{"cve":"CVE-2021-42739","qid":"180358","title":"Debian Security Update for linux (CVE-2021-42739)"},{"cve":"CVE-2021-42739","qid":"198589","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5165-1)"},{"cve":"CVE-2021-42739","qid":"198616","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5207-1)"},{"cve":"CVE-2021-42739","qid":"198653","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5265-1)"},{"cve":"CVE-2021-42739","qid":"198654","title":"Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5266-1)"},{"cve":"CVE-2021-42739","qid":"198655","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5268-1)"},{"cve":"CVE-2021-42739","qid":"198656","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5267-1)"},{"cve":"CVE-2021-42739","qid":"198666","title":"Ubuntu Security Notification for Linux kernel (Raspberry Pi) Vulnerabilities (USN-5267-3)"},{"cve":"CVE-2021-42739","qid":"239989","title":"Red Hat Update for kernel-rt (RHSA-2022:0065)"},{"cve":"CVE-2021-42739","qid":"239997","title":"Red Hat Update for kernel (RHSA-2022:0063)"},{"cve":"CVE-2021-42739","qid":"240275","title":"Red Hat Update for kernel-rt (RHSA-2022:1975)"},{"cve":"CVE-2021-42739","qid":"240298","title":"Red Hat Update for kernel security (RHSA-2022:1988)"},{"cve":"CVE-2021-42739","qid":"257142","title":"CentOS Security Update for kernel (CESA-2022:0063)"},{"cve":"CVE-2021-42739","qid":"257144","title":"CentOS Security Update for kernel (CESA-2022:0063)"},{"cve":"CVE-2021-42739","qid":"282057","title":"Fedora Security Update for kernel (FEDORA-2021-8364530ebf)"},{"cve":"CVE-2021-42739","qid":"282058","title":"Fedora Security Update for kernel (FEDORA-2021-7de33b7016)"},{"cve":"CVE-2021-42739","qid":"282160","title":"Fedora Security Update for kernel (FEDORA-2021-fdef34e26f)"},{"cve":"CVE-2021-42739","qid":"353242","title":"Amazon Linux Security Advisory for kernel : ALAC2012-2022-036"},{"cve":"CVE-2021-42739","qid":"353243","title":"Amazon Linux Security Advisory for kmod-mlx5 : ALAC2012-2022-037"},{"cve":"CVE-2021-42739","qid":"353244","title":"Amazon Linux Security Advisory for kmod-sfc : ALAC2012-2022-038"},{"cve":"CVE-2021-42739","qid":"671219","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1030)"},{"cve":"CVE-2021-42739","qid":"671225","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1010)"},{"cve":"CVE-2021-42739","qid":"671252","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1171)"},{"cve":"CVE-2021-42739","qid":"671282","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1255)"},{"cve":"CVE-2021-42739","qid":"671304","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1208)"},{"cve":"CVE-2021-42739","qid":"671344","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1271)"},{"cve":"CVE-2021-42739","qid":"751336","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1460-1)"},{"cve":"CVE-2021-42739","qid":"751342","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:3641-1)"},{"cve":"CVE-2021-42739","qid":"751346","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:3655-1)"},{"cve":"CVE-2021-42739","qid":"751349","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1477-1)"},{"cve":"CVE-2021-42739","qid":"751353","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:3675-1)"},{"cve":"CVE-2021-42739","qid":"751381","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:3748-1)"},{"cve":"CVE-2021-42739","qid":"751437","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:3876-1)"},{"cve":"CVE-2021-42739","qid":"751441","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:3876-1)"},{"cve":"CVE-2021-42739","qid":"751451","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:3935-1)"},{"cve":"CVE-2021-42739","qid":"751476","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:3972-1)"},{"cve":"CVE-2021-42739","qid":"751687","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (SUSE-SU-2022:0328-1)"},{"cve":"CVE-2021-42739","qid":"751688","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (SUSE-SU-2022:0325-1)"},{"cve":"CVE-2021-42739","qid":"751689","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (SUSE-SU-2022:0327-1)"},{"cve":"CVE-2021-42739","qid":"753087","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 22 for SLE 15) (SUSE-SU-2022:0255-1)"},{"cve":"CVE-2021-42739","qid":"753118","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 3 for SLE 15 SP3) (SUSE-SU-2022:0295-1)"},{"cve":"CVE-2021-42739","qid":"753121","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (SUSE-SU-2022:0241-1)"},{"cve":"CVE-2021-42739","qid":"753155","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 24 for SLE 15) (SUSE-SU-2022:0237-1)"},{"cve":"CVE-2021-42739","qid":"753211","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (SUSE-SU-2022:0291-1)"},{"cve":"CVE-2021-42739","qid":"753257","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 23 for SLE 15) (SUSE-SU-2022:0243-1)"},{"cve":"CVE-2021-42739","qid":"753268","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (SUSE-SU-2022:0254-1)"},{"cve":"CVE-2021-42739","qid":"753272","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 16 for SLE 12 SP5) (SUSE-SU-2022:0234-1)"},{"cve":"CVE-2021-42739","qid":"753292","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 0 for SLE 15 SP3) (SUSE-SU-2022:0293-1)"},{"cve":"CVE-2021-42739","qid":"753329","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 19 for SLE 15 SP2) (SUSE-SU-2022:0238-1)"},{"cve":"CVE-2021-42739","qid":"753369","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (SUSE-SU-2022:0292-1)"},{"cve":"CVE-2021-42739","qid":"753385","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 4 for SLE 15 SP3) (SUSE-SU-2022:0257-1)"},{"cve":"CVE-2021-42739","qid":"753393","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 23 for SLE 12 SP5) (SUSE-SU-2022:0246-1)"},{"cve":"CVE-2021-42739","qid":"753408","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 15 for SLE 12 SP5) (SUSE-SU-2022:0263-1)"},{"cve":"CVE-2021-42739","qid":"753423","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 7 for SLE 15 SP3) (SUSE-SU-2022:0270-1)"},{"cve":"CVE-2021-42739","qid":"900425","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6103)"},{"cve":"CVE-2021-42739","qid":"901605","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6601-1)"},{"cve":"CVE-2021-42739","qid":"905786","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6103-1)"},{"cve":"CVE-2021-42739","qid":"940517","title":"AlmaLinux Security Update for kernel (ALSA-2022:1988)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-42739","ASSIGNER":"cve@mitre.org","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/","url":"https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"},{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1951739","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951739"},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"refsource":"MISC","name":"https://www.starwindsoftware.com/security/sw-20220804-0001/","url":"https://www.starwindsoftware.com/security/sw-20220804-0001/"}]},"description":{"description_data":[{"lang":"eng","value":"A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability."}]}},"nvd":{"publishedDate":"2021-10-20 07:15:00","lastModifiedDate":"2023-11-07 03:39:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.6},"severity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndIncluding":"5.14.13","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:starwindsoftware:starwind_san_\\&_nas:v8r12:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8r13:14338:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"42739","Ordinal":"219234","Title":"CVE-2021-42739","CVE":"CVE-2021-42739","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"42739","Ordinal":"1","NoteData":"The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"42739","Ordinal":"2","NoteData":"2021-10-20","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"42739","Ordinal":"3","NoteData":"2021-11-14","Type":"Other","Title":"Modified"}]}}}