
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-46930 affects the Linux kernel's MediaTek USB3 Dual Role controller support (CONFIG_USB_MTU3). The vulnerability is related to an uninitialized list_head in the USB subsystem, which was discovered and fixed in December 2021 (Kernel Git, Red Hat CVE).
The vulnerability stems from an uninitialized list_head in the mtu3_alloc_request function within the USB subsystem. This issue can trigger a KASAN (Kernel Address Sanitizer) use-after-free warning in the __list_del_entry_valid function. The vulnerability has been assigned a CVSS v3 score of 4.4, indicating a relatively low severity (Red Hat CVE).
The vulnerability's impact is limited as it only affects systems with MediaTek USB3 Dual Role controller support enabled. The issue can potentially lead to system instability or crashes when the affected component is in use (Red Hat CVE).
The issue has been fixed by initializing the list_head structure properly using INIT_LIST_HEAD(&mreq->list) in the mtu3_alloc_request function. For Red Hat products, no specific mitigation is needed as the MediaTek USB3 Dual Role controller support is not enabled in any shipping kernel release (Red Hat CVE, Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."