In the Linux kernel, the following vulnerability has been resolved:
comedi: ni_usb6501: fix NULL-deref in command paths
The driver uses endpoint-sized USB transfer buffers but had no sanity
checks on the sizes. This can lead to zero-size-pointer dereferences or
overflowed transfer buffers in ni6501_port_command() and
ni6501_counter_command() if a (malicious) device has smaller max-packet
sizes than expected (or when doing descriptor fuzz testing).
Add the missing sanity checks to probe().
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-05-22 09:15
Updated : 2025-04-02 15:10
NVD link : CVE-2021-47476
Mitre link : CVE-2021-47476
CVE.ORG link : CVE-2021-47476
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
