4.6
CVE-2021-47476
- EPSS 0.04%
- Published 22.05.2024 09:15:09
- Last modified 02.04.2025 15:10:34
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: comedi: ni_usb6501: fix NULL-deref in command paths The driver uses endpoint-sized USB transfer buffers but had no sanity checks on the sizes. This can lead to zero-size-pointer dereferences or overflowed transfer buffers in ni6501_port_command() and ni6501_counter_command() if a (malicious) device has smaller max-packet sizes than expected (or when doing descriptor fuzz testing). Add the missing sanity checks to probe().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 3.18 < 4.4.292
Linux ≫ Linux Kernel Version >= 4.5 < 4.9.290
Linux ≫ Linux Kernel Version >= 4.10 < 4.14.255
Linux ≫ Linux Kernel Version >= 4.15 < 4.19.217
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.159
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.79
Linux ≫ Linux Kernel Version >= 5.11 < 5.14.18
Linux ≫ Linux Kernel Version >= 5.15 < 5.15.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.088 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 4.6 | 0.9 | 3.6 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.