5.5
CVE-2021-46930
- EPSS 0.02%
 - Veröffentlicht 27.02.2024 10:15:07
 - Zuletzt bearbeitet 21.11.2024 06:34:57
 - Quelle 416baaa9-dc9f-4396-8d5f-8c081f
 - CVE-Watchlists
 - Unerledigt
 
In the Linux kernel, the following vulnerability has been resolved: usb: mtu3: fix list_head check warning This is caused by uninitialization of list_head. BUG: KASAN: use-after-free in __list_del_entry_valid+0x34/0xe4 Call trace: dump_backtrace+0x0/0x298 show_stack+0x24/0x34 dump_stack+0x130/0x1a8 print_address_description+0x88/0x56c __kasan_report+0x1b8/0x2a0 kasan_report+0x14/0x20 __asan_load8+0x9c/0xa0 __list_del_entry_valid+0x34/0xe4 mtu3_req_complete+0x4c/0x300 [mtu3] mtu3_gadget_stop+0x168/0x448 [mtu3] usb_gadget_unregister_driver+0x204/0x3a0 unregister_gadget_item+0x44/0xa4
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
	Linux ≫ Linux Kernel  Version >= 5.2.0 < 5.4.170
	Linux ≫ Linux Kernel  Version >= 5.5.0 < 5.10.90
	Linux ≫ Linux Kernel  Version >= 5.11.0 < 5.15.13
| Typ | Quelle | Score | Percentile | 
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.021 | 
| Quelle | Base Score | Exploit Score | Impact Score | Vector String | 
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 | 
                 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H  
             | 
        
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.