CVE-2021-46906

In the Linux kernel, the following vulnerability has been resolved: HID: usbhid: fix info leak in hid_submit_ctrl In hid_submit_ctrl(), the way of calculating the report length doesn't take into account that report->size can be zero. When running the syzkaller reproducer, a report of size 0 causes hid_submit_ctrl) to calculate transfer_buffer_length as 16384. When this urb is passed to the usb core layer, KMSAN reports an info leak of 16384 bytes. To fix this, first modify hid_report_len() to account for the zero report size case by using DIV_ROUND_UP for the division. Then, call it from hid_submit_ctrl().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Apr 2024, 17:28

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: usbhid: corrige fuga de información en hid_submit_ctrl En hid_submit_ctrl(), la forma de calcular la longitud del informe no tiene en cuenta que el tamaño del informe->puede ser cero. Cuando se ejecuta el reproductor syzkaller, un informe de tamaño 0 hace que hid_submit_ctrl) calcule transfer_buffer_length como 16384. Cuando esta urb se pasa a la capa central USB, KMSAN informa una fuga de información de 16384 bytes. Para solucionar este problema, primero modifique hid_report_len() para tener en cuenta el caso de tamaño de informe cero utilizando DIV_ROUND_UP para la división. Luego, llámalo desde hid_submit_ctrl().
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE CWE-668
References () https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82 - () https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82 - Patch
References () https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8 - () https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8 - Patch
References () https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce - () https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce - Patch
References () https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f - () https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f - Patch
References () https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1 - () https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1 - Patch
References () https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0 - () https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0 - Patch
References () https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9 - () https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9 - Patch
References () https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366 - () https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366 - Patch

26 Feb 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-26 18:15

Updated : 2024-04-17 17:28


NVD link : CVE-2021-46906

Mitre link : CVE-2021-46906

CVE.ORG link : CVE-2021-46906


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-668

Exposure of Resource to Wrong Sphere