cve-2021-46905
Vulnerability from cvelistv5
Published
2024-02-25 14:03
Modified
2024-11-04 11:55
Severity ?
Summary
net: hso: fix NULL-deref on disconnect regression
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570ePatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19efPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53ePatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570ePatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19efPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53ePatch
Impacted products
Vendor Product Version
Linux Linux Version: 5.12
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-46905",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-04T21:23:48.854357Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:22:07.815Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.986Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/usb/hso.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "5871761c5f0f",
              "status": "affected",
              "version": "a462067d7c8e",
              "versionType": "git"
            },
            {
              "lessThan": "0c71d4c89559",
              "status": "affected",
              "version": "145c89c441d2",
              "versionType": "git"
            },
            {
              "lessThan": "24b699bea755",
              "status": "affected",
              "version": "caf5ac93b3b5",
              "versionType": "git"
            },
            {
              "lessThan": "5c17cfe155d2",
              "status": "affected",
              "version": "92028d7a31e5",
              "versionType": "git"
            },
            {
              "lessThan": "d7fad2ce15bd",
              "status": "affected",
              "version": "4a2933c88399",
              "versionType": "git"
            },
            {
              "lessThan": "90642ee9eb58",
              "status": "affected",
              "version": "dc195928d7e4",
              "versionType": "git"
            },
            {
              "lessThan": "0f000005da31",
              "status": "affected",
              "version": "388d05f70f1e",
              "versionType": "git"
            },
            {
              "lessThan": "41c44e1f3112",
              "status": "affected",
              "version": "8a12f8836145",
              "versionType": "git"
            },
            {
              "lessThan": "2ad5692db728",
              "status": "affected",
              "version": "8a12f8836145",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/usb/hso.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.12"
            },
            {
              "lessThan": "5.12",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.189",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.115",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.33",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.11.*",
              "status": "unaffected",
              "version": "5.11.17",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hso: fix NULL-deref on disconnect regression\n\nCommit 8a12f8836145 (\"net: hso: fix null-ptr-deref during tty device\nunregistration\") fixed the racy minor allocation reported by syzbot, but\nintroduced an unconditional NULL-pointer dereference on every disconnect\ninstead.\n\nSpecifically, the serial device table must no longer be accessed after\nthe minor has been released by hso_serial_tty_unregister()."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T11:55:37.573Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554"
        },
        {
          "url": "https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e"
        },
        {
          "url": "https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1"
        },
        {
          "url": "https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725"
        },
        {
          "url": "https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e"
        },
        {
          "url": "https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273"
        },
        {
          "url": "https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00"
        },
        {
          "url": "https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef"
        },
        {
          "url": "https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3"
        }
      ],
      "title": "net: hso: fix NULL-deref on disconnect regression",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-46905",
    "datePublished": "2024-02-25T14:03:40.944Z",
    "dateReserved": "2024-02-25T13:45:52.717Z",
    "dateUpdated": "2024-11-04T11:55:37.573Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-46905\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-26T16:27:45.367\",\"lastModified\":\"2024-11-21T06:34:54.113\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: hso: fix NULL-deref on disconnect regression\\n\\nCommit 8a12f8836145 (\\\"net: hso: fix null-ptr-deref during tty device\\nunregistration\\\") fixed the racy minor allocation reported by syzbot, but\\nintroduced an unconditional NULL-pointer dereference on every disconnect\\ninstead.\\n\\nSpecifically, the serial device table must no longer be accessed after\\nthe minor has been released by hso_serial_tty_unregister().\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: hso: corrige NULL-deref durante la regresi\u00f3n de desconexi\u00f3n. El Commit 8a12f8836145 (\\\"net: hso: corrige null-ptr-deref durante la cancelaci\u00f3n del registro del dispositivo tty\\\") corrigi\u00f3 la asignaci\u00f3n menor picante reportada por syzbot, pero en su lugar introdujo una desreferencia de puntero NULL incondicional en cada desconexi\u00f3n. Espec\u00edficamente, ya no se debe acceder a la tabla de dispositivos serie despu\u00e9s de que hso_serial_tty_unregister() haya liberado al menor.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.19.189\",\"matchCriteriaId\":\"4018ABCC-3436-498F-A06A-64578CF99BC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20.0\",\"versionEndExcluding\":\"5.4.115\",\"matchCriteriaId\":\"CC57D065-3933-4083-BA07-817D4CBF8157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5.0\",\"versionEndExcluding\":\"5.10.33\",\"matchCriteriaId\":\"995EF7FE-8C8F-470B-8214-BC0C68B162C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11.0\",\"versionEndExcluding\":\"5.11.17\",\"matchCriteriaId\":\"6C74925C-5E45-4C6F-9E47-653DC5ACBE9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"75EB504D-4A83-4C67-9C8D-FD9C6C8EB4CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"07875739-0CCB-4F48-9330-3D4B6A4064FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA09B732-04F8-452C-94CF-97644E78684D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5371152-7515-4908-BB7E-494805EA5DF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7788E5B-D54E-45BF-9043-2C7B77842FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A935F9F1-DA8B-49F4-BF2B-FA01A92F113E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF0AF673-12B7-4274-9090-411D4939CB62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"06AE06A6-A0C3-4556-BFFA-3D6E4BAC43C8\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.