In the Linux kernel, the following vulnerability has been resolved:
HID: usbhid: fix info leak in hid_submit_ctrl
In hid_submit_ctrl(), the way of calculating the report length doesn't
take into account that report->size can be zero. When running the
syzkaller reproducer, a report of size 0 causes hid_submit_ctrl) to
calculate transfer_buffer_length as 16384. When this urb is passed to
the usb core layer, KMSAN reports an info leak of 16384 bytes.
To fix this, first modify hid_report_len() to account for the zero
report size case by using DIV_ROUND_UP for the division. Then, call it
from hid_submit_ctrl().
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 2 - Kernel-5.10 Extra | kernel | 2022-01-20 23:37 | ALAS2KERNEL-5.10-2022-002 |
Amazon Linux 2 - Kernel-5.4 Extra | kernel | 2022-01-12 19:26 | ALAS2KERNEL-5.4-2022-004 |
Amazon Linux 2 - Core | kernel | 2021-07-14 20:35 | ALAS2-2021-1685 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 5.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |