Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-46906
HistoryFeb 26, 2024 - 12:00 a.m.

CVE-2021-46906

2024-02-2600:00:00
ubuntu.com
ubuntu.com
4
linux kernel
hid
vulnerability
info leak

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.6 Medium

AI Score

Confidence

High

1.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:S/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

12.1%

In the Linux kernel, the following vulnerability has been resolved: HID:
usbhid: fix info leak in hid_submit_ctrl In hid_submit_ctrl(), the way of
calculating the report length doesn’t take into account that report->size
can be zero. When running the syzkaller reproducer, a report of size 0
causes hid_submit_ctrl) to calculate transfer_buffer_length as 16384. When
this urb is passed to the usb core layer, KMSAN reports an info leak of
16384 bytes. To fix this, first modify hid_report_len() to account for the
zero report size case by using DIV_ROUND_UP for the division. Then, call it
from hid_submit_ctrl().

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.6 Medium

AI Score

Confidence

High

1.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:S/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

12.1%