5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.6 Medium
AI Score
Confidence
High
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:S/C:P/I:N/A:N
0.0004 Low
EPSS
Percentile
12.1%
In the Linux kernel, the following vulnerability has been resolved: HID:
usbhid: fix info leak in hid_submit_ctrl In hid_submit_ctrl(), the way of
calculating the report length doesn’t take into account that report->size
can be zero. When running the syzkaller reproducer, a report of size 0
causes hid_submit_ctrl) to calculate transfer_buffer_length as 16384. When
this urb is passed to the usb core layer, KMSAN reports an info leak of
16384 bytes. To fix this, first modify hid_report_len() to account for the
zero report size case by using DIV_ROUND_UP for the division. Then, call it
from hid_submit_ctrl().
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f (5.13-rc5)
git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
launchpad.net/bugs/cve/CVE-2021-46906
nvd.nist.gov/vuln/detail/CVE-2021-46906
security-tracker.debian.org/tracker/CVE-2021-46906
www.cve.org/CVERecord?id=CVE-2021-46906
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.6 Medium
AI Score
Confidence
High
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:S/C:P/I:N/A:N
0.0004 Low
EPSS
Percentile
12.1%