In the Linux kernel, the following vulnerability has been resolved:
comedi: ni_usb6501: fix NULL-deref in command paths
The driver uses endpoint-sized USB transfer buffers but had no sanity
checks on the sizes. This can lead to zero-size-pointer dereferences or
overflowed transfer buffers in ni6501_port_command() and
ni6501_counter_command() if a (malicious) device has smaller max-packet
sizes than expected (or when doing descriptor fuzz testing).
Add the missing sanity checks to probe().
References
Configurations
No configuration.
History
01 Nov 2024, 15:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.6 |
03 Jul 2024, 01:38
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-476 | |
Summary |
|
22 May 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-22 09:15
Updated : 2024-11-01 15:35
NVD link : CVE-2021-47476
Mitre link : CVE-2021-47476
CVE.ORG link : CVE-2021-47476
JSON object : View
Products Affected
No product.
CWE
CWE-476
NULL Pointer Dereference