### Impact
_What kind of vulnerability is it? Who is impacted?_
The vulnerable component could be crashed when the configuration file is intentionally/ unintentionally containing the special characters.
All the applications which are using could fail to generate their dlt logs in system.

### Patches
_Has the problem been patched? What versions should users upgrade to?_
There is solution for the problem but the patch is not integrated yet.

### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Check the integrity of information in configuration file manually.

### References
_Are there any links users can visit to find out more?_

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [ GENIVI/dlt-daemon ](
* Email us at [Mailinglist](mailto:

Source: CVE-2021-29507

댓글 남기기

이메일은 공개되지 않습니다. 필수 입력창은 * 로 표시되어 있습니다

Time limit is exhausted. Please reload the CAPTCHA.