Memory leak in Linux kernel usbhid



Published: 2024-04-02
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-46906
CWE-ID CWE-401
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Memory leak

EUVDB-ID: #VU87992

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-46906

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform DoS attack on the target system.

The vulnerability exists due memory leak within the hid_submit_ctrl() function in drivers/hid/usbhid/hid-core.c. A local user can force the driver to leak memory and perform denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Linux kernel: All versions

CPE2.3
External links

http://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
http://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
http://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
http://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
http://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
http://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
http://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
http://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###