Resource Leak Affecting kernel-devel package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-KERNELDEVEL-6280045
- published 27 Feb 2024
- disclosed 26 Feb 2024
Introduced: 26 Feb 2024
CVE-2021-46906 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:7
kernel-devel
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-devel
package and not the kernel-devel
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
HID: usbhid: fix info leak in hid_submit_ctrl
In hid_submit_ctrl(), the way of calculating the report length doesn't take into account that report->size can be zero. When running the syzkaller reproducer, a report of size 0 causes hid_submit_ctrl) to calculate transfer_buffer_length as 16384. When this urb is passed to the usb core layer, KMSAN reports an info leak of 16384 bytes.
To fix this, first modify hid_report_len() to account for the zero report size case by using DIV_ROUND_UP for the division. Then, call it from hid_submit_ctrl().
References
- https://access.redhat.com/security/cve/CVE-2021-46906
- https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
- https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
- https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
- https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
- https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
- https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
- https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
- https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366