In the Linux kernel, the following vulnerability has been resolved:
comedi: ni_usb6501: fix NULL-deref in command paths
The driver uses endpoint-sized USB transfer buffers but had no sanity checks on the sizes. This can lead to zero-size-pointer dereferences or overflowed transfer buffers in ni6501portcommand() and ni6501countercommand() if a (malicious) device has smaller max-packet sizes than expected (or when doing descriptor fuzz testing).
Add the missing sanity checks to probe().
[
{
"events": [
{
"introduced": "3.18"
},
{
"fixed": "4.4.292"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.9.290"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.255"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.217"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.159"
}
]
},
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.79"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.14.18"
}
]
},
{
"events": [
{
"introduced": "5.15"
},
{
"fixed": "5.15.2"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47476.json"