In the Linux kernel, the following vulnerability has been resolved:
usbnet: sanity check for maxpacket
maxpacket of 0 makes no sense and oopses as we need to divide
by it. Give up.
V2: fixed typo in log and stylistic issues
References
Configurations
Configuration 1 (hide)
|
History
29 Sep 2025, 16:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/002d82227c0abe29118cf80f7e2f396b22d448ed - Patch | |
| References | () https://git.kernel.org/stable/c/397430b50a363d8b7bdda00522123f82df6adc5e - Patch | |
| References | () https://git.kernel.org/stable/c/492140e45d2bf27c1014243f8616a9b612144e20 - Patch | |
| References | () https://git.kernel.org/stable/c/524f333e98138d909a0a0c574a9ff6737dce2767 - Patch | |
| References | () https://git.kernel.org/stable/c/693ecbe8f799405f8775719deedb1f76265d375a - Patch | |
| References | () https://git.kernel.org/stable/c/74b3b27cf9fecce00cd8918b7882fd81191d0aa4 - Patch | |
| References | () https://git.kernel.org/stable/c/7e8b6a4f18edee070213cb6a77118e8a412253c5 - Patch | |
| References | () https://git.kernel.org/stable/c/b9eba0a4a527e04d712f0e0401e5391ef124b33e - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-369 | |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Information
Published : 2024-05-22 09:15
Updated : 2025-09-29 16:34
NVD link : CVE-2021-47495
Mitre link : CVE-2021-47495
CVE.ORG link : CVE-2021-47495
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-369
Divide By Zero
