CVE-2021-47476
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
22/05/2024
Last modified:
02/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
comedi: ni_usb6501: fix NULL-deref in command paths<br />
<br />
The driver uses endpoint-sized USB transfer buffers but had no sanity<br />
checks on the sizes. This can lead to zero-size-pointer dereferences or<br />
overflowed transfer buffers in ni6501_port_command() and<br />
ni6501_counter_command() if a (malicious) device has smaller max-packet<br />
sizes than expected (or when doing descriptor fuzz testing).<br />
<br />
Add the missing sanity checks to probe().
Impact
Base Score 3.x
4.60
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.18 (including) | 4.4.292 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.290 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.255 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.217 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.159 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.79 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.18 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/4a9d43cb5d5f39fa39fc1da438517004cc95f7ea
- https://git.kernel.org/stable/c/58478143771b20ab219937b1c30a706590a59224
- https://git.kernel.org/stable/c/907767da8f3a925b060c740e0b5c92ea7dbec440
- https://git.kernel.org/stable/c/aa39738423503825625853b643b9e99d11c23816
- https://git.kernel.org/stable/c/b0156b7c9649d8f55a2ce3d3258509f1b2a181c3
- https://git.kernel.org/stable/c/bc51111bf6e8e7b6cc94b133e4c291273a16acd1
- https://git.kernel.org/stable/c/d6a727a681a39ae4f73081a9bedb45d14f95bdd1
- https://git.kernel.org/stable/c/df7b1238f3b599a0b9284249772cdfd1ea83a632
- https://git.kernel.org/stable/c/ef143dc0c3defe56730ecd3a9de7b3e1d7e557c1
- https://git.kernel.org/stable/c/4a9d43cb5d5f39fa39fc1da438517004cc95f7ea
- https://git.kernel.org/stable/c/58478143771b20ab219937b1c30a706590a59224
- https://git.kernel.org/stable/c/907767da8f3a925b060c740e0b5c92ea7dbec440
- https://git.kernel.org/stable/c/aa39738423503825625853b643b9e99d11c23816
- https://git.kernel.org/stable/c/b0156b7c9649d8f55a2ce3d3258509f1b2a181c3
- https://git.kernel.org/stable/c/bc51111bf6e8e7b6cc94b133e4c291273a16acd1
- https://git.kernel.org/stable/c/d6a727a681a39ae4f73081a9bedb45d14f95bdd1
- https://git.kernel.org/stable/c/df7b1238f3b599a0b9284249772cdfd1ea83a632
- https://git.kernel.org/stable/c/ef143dc0c3defe56730ecd3a9de7b3e1d7e557c1