Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-47528
HistoryMay 24, 2024 - 12:00 a.m.

CVE-2021-47528

2024-05-2400:00:00
ubuntu.com
ubuntu.com
1
linux kernel
usb
cdnsp
null pointer
vulnerability fix
static analyzer
security operations

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

In the Linux kernel, the following vulnerability has been resolved: usb:
cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init() In
cdnsp_endpoint_init(), cdnsp_ring_alloc() is assigned to pep->ring and
there is a dereference of it in cdnsp_endpoint_init(), which could lead to
a NULL pointer dereference on failure of cdnsp_ring_alloc(). Fix this bug
by adding a check of pep->ring. This bug was found by a static analyzer.
The analysis employs differential checking to identify inconsistent
security operations (e.g., checks or kfrees) between two code paths and
confirms that the inconsistent operations are not recovered in the current
function or the callers, so they constitute bugs. Note that, as a bug found
by static analysis, it can be a false positive or hard to trigger. Multiple
researchers have cross-reviewed the bug. Builds with
CONFIG_USB_CDNSP_GADGET=y show no new warnings, and our static analyzer no
longer warns about this code.

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%