In the Linux kernel, the following vulnerability has been resolved:
HID: usbhid: fix info leak in hid_submit_ctrl
In hid_submit_ctrl(), the way of calculating the report length doesn't
take into account that report->size can be zero. When running the
syzkaller reproducer, a report of size 0 causes hid_submit_ctrl) to
calculate transfer_buffer_length as 16384. When this urb is passed to
the usb core layer, KMSAN reports an info leak of 16384 bytes.
To fix this, first modify hid_report_len() to account for the zero
report size case by using DIV_ROUND_UP for the division. Then, call it
from hid_submit_ctrl().
Metrics
Affected Vendors & Products
References
History
Thu, 19 Dec 2024 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-26T17:20:22.144Z
Updated: 2024-12-19T07:31:34.509Z
Reserved: 2024-02-25T13:45:52.717Z
Link: CVE-2021-46906
Vulnrichment
Updated: 2024-08-04T05:17:42.969Z
NVD
Status : Modified
Published: 2024-02-26T18:15:07.160
Modified: 2024-11-21T06:34:54.283
Link: CVE-2021-46906
Redhat