In the Linux kernel, the following vulnerability has been resolved:
HID: usbhid: fix info leak in hid_submit_ctrl
In hid_submit_ctrl(), the way of calculating the report length doesn't
take into account that report->size can be zero. When running the
syzkaller reproducer, a report of size 0 causes hid_submit_ctrl) to
calculate transfer_buffer_length as 16384. When this urb is passed to
the usb core layer, KMSAN reports an info leak of 16384 bytes.
To fix this, first modify hid_report_len() to account for the zero
report size case by using DIV_ROUND_UP for the division. Then, call it
from hid_submit_ctrl().
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82 - Patch | |
References | () https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8 - Patch | |
References | () https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce - Patch | |
References | () https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f - Patch | |
References | () https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1 - Patch | |
References | () https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0 - Patch | |
References | () https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9 - Patch | |
References | () https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366 - Patch |
17 Apr 2024, 17:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-668 | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82 - Patch | |
References | () https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8 - Patch | |
References | () https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce - Patch | |
References | () https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f - Patch | |
References | () https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1 - Patch | |
References | () https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0 - Patch | |
References | () https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9 - Patch | |
References | () https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
26 Feb 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-26 18:15
Updated : 2024-11-21 06:34
NVD link : CVE-2021-46906
Mitre link : CVE-2021-46906
CVE.ORG link : CVE-2021-46906
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-668
Exposure of Resource to Wrong Sphere