In the Linux kernel, the following vulnerability has been resolved: comedi:
ni_usb6501: fix NULL-deref in command paths The driver uses endpoint-sized
USB transfer buffers but had no sanity checks on the sizes. This can lead
to zero-size-pointer dereferences or overflowed transfer buffers in
ni6501_port_command() and ni6501_counter_command() if a (malicious) device
has smaller max-packet sizes than expected (or when doing descriptor fuzz
testing). Add the missing sanity checks to probe().
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-4.15 | < any | UNKNOWN |
git.kernel.org/linus/907767da8f3a925b060c740e0b5c92ea7dbec440 (5.16-rc1)
git.kernel.org/stable/c/4a9d43cb5d5f39fa39fc1da438517004cc95f7ea
git.kernel.org/stable/c/58478143771b20ab219937b1c30a706590a59224
git.kernel.org/stable/c/907767da8f3a925b060c740e0b5c92ea7dbec440
git.kernel.org/stable/c/aa39738423503825625853b643b9e99d11c23816
git.kernel.org/stable/c/b0156b7c9649d8f55a2ce3d3258509f1b2a181c3
git.kernel.org/stable/c/bc51111bf6e8e7b6cc94b133e4c291273a16acd1
git.kernel.org/stable/c/d6a727a681a39ae4f73081a9bedb45d14f95bdd1
git.kernel.org/stable/c/df7b1238f3b599a0b9284249772cdfd1ea83a632
git.kernel.org/stable/c/ef143dc0c3defe56730ecd3a9de7b3e1d7e557c1
launchpad.net/bugs/cve/CVE-2021-47476
nvd.nist.gov/vuln/detail/CVE-2021-47476
security-tracker.debian.org/tracker/CVE-2021-47476
www.cve.org/CVERecord?id=CVE-2021-47476