发布时间: 2023年1月5日
修改时间: 2023年1月6日
This vulnerability may cause kernel cache write overwriting, affecting integrity and system availability. When a hid device is created, the HID_GLOBAL_ITEM_TAG_REPORT_SIZE and HID_GLOBAL_ITEM_TAG_REPORT_COUNT fields are set to 0. As a result, the size field in the applied report structure is 0. This problem may occur when the device is accessed later. When report->size is set to 0, the memory length cleared by memset is 536870912. As a result, other memory areas are cleared by mistake, causing a kernel exception.
NVD | openEuler | |
---|---|---|
Confidentiality | Low | |
Attack Vector | Network | |
CVSS评分 | 6.3 | |
Attack Complexity | Low | |
Privileges Required | Low | |
Scope | Unchanged | |
Integrity | Low | |
User Interaction | None | |
Availability | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1001 | This vulnerability may cause kernel cache write overwriting, affecting integrity and system availability. When a hid device is created, the HID_GLOBAL_ITEM_TAG_REPORT_SIZE and HID_GLOBAL_ITEM_TAG_REPORT_COUNT fields are set to 0. As a result, the size field in the applied report structure is 0. This problem may occur when the device is accessed later. When report->size is set to 0, the memory length cleared by memset is 536870912. As a result, other memory areas are cleared by mistake, causing a kernel exception. | 2023年1月5日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | kernel | Unaffected |
KY3.4-5 | kernel | Unaffected |
KY3.5.1 | kernel | Unaffected |