CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%
In the Linux kernel, the following vulnerability has been resolved: ALSA:
hda: intel-sdw-acpi: harden detection of controller The existing code
currently sets a pointer to an ACPI handle before checking that it’s
actually a SoundWire controller. This can lead to issues where the graph
walk continues and eventually fails, but the pointer was set already. This
patch changes the logic so that the information provided to the caller is
set when a controller is found.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-ibm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-iot | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-kvm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-oracle | < any | UNKNOWN |
git.kernel.org/linus/385f287f9853da402d94278e59f594501c1d1dad (5.16-rc7)
git.kernel.org/stable/c/385f287f9853da402d94278e59f594501c1d1dad
git.kernel.org/stable/c/cce476954401e3421afafb25bbaa926050688b1d
launchpad.net/bugs/cve/CVE-2021-46926
nvd.nist.gov/vuln/detail/CVE-2021-46926
security-tracker.debian.org/tracker/CVE-2021-46926
www.cve.org/CVERecord?id=CVE-2021-46926