U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-29507

Change History

CVE Modified by GitHub, Inc. 5/28/2021 6:15:07 PM

Action Type Old Value New Value
Changed Description
### Impact
_What kind of vulnerability is it? Who is impacted?_
The vulnerable component could be crashed when the configuration file is intentionally/ unintentionally containing the special characters.
All the applications which are using could fail to generate their dlt logs in system.

### Patches
_Has the problem been patched? What versions should users upgrade to?_
There is solution for the problem but the patch is not integrated yet.

### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Check the integrity of information in configuration file manually.

### References
_Are there any links users can visit to find out more?_
N/A

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [ GENIVI/dlt-daemon ](https://github.com/GENIVI/dlt-daemon/issues)
* Email us at [Mailinglist](mailto:https://lists.genivi.org/mailman/listinfo/genivi-diagnostic-log-and-trace_lists.genivi.org)
### Impact _What kind of vulnerability is it? Who is impacted?_ The vulnerable component could be crashed when the configuration file is intentionally/ unintentionally containing the special characters. All the applications which are using could fail to generate their dlt logs in system. ### Patches _Has the problem been patched? What versions should users upgrade to?_ There is solution for the problem but the patch is not integrated yet. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Check the integrity of information in configuration file manually. ### References _Are there any links users can visit to find out more?_ N/A ### For more information If you have any questions or comments about this advisory: * Open an issue in [ GENIVI/dlt-daemon ](https://github.com/GENIVI/dlt-daemon/issues) * Email us at [Mailinglist](mailto:https://lists.genivi.org/mailman/listinfo/genivi-diagnostic-log-and-trace_lists.genivi.org)