In the Linux kernel, the following vulnerability has been resolved: comedi: ni_usb6501: fix NULL-deref in command paths The driver uses endpoint-sized USB transfer buffers but had no sanity checks on the sizes. This can lead to zero-size-pointer dereferences or overflowed transfer buffers in ni6501_port_command() and ni6501_counter_command() if a (malicious) device has smaller max-packet sizes than expected (or when doing descriptor fuzz testing). Add the missing sanity checks to probe().
Version | Score | Severity | Vector String |
---|---|---|---|
3.1 | 4.6 | Medium | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Product | Vendor | Version |
---|---|---|
Linux | Linux | < 10.0.22000.2176 |
Linux | Linux | < 10.0.19045.3208 |