CVE-2023-52703

medium

Description

In the Linux kernel, the following vulnerability has been resolved: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path syzbot reported that act_len in kalmia_send_init_packet() is uninitialized when passing it to the first usb_bulk_msg error path. Jiri Pirko noted that it's pointless to pass it in the error path, and that the value that would be printed in the second error path would be the value of act_len from the first call to usb_bulk_msg.[1] With this in mind, let's just not pass act_len to the usb_bulk_msg error paths. 1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/

References

https://git.kernel.org/stable/c/c68f345b7c425b38656e1791a0486769a8797016

https://git.kernel.org/stable/c/a753352622b4f3c0219e0e9c73114b2848ae6042

https://git.kernel.org/stable/c/723ef7b66f37c0841f5a451ccbce47ee1641e081

https://git.kernel.org/stable/c/525bdcb0838d19d918c7786151ee14661967a030

https://git.kernel.org/stable/c/338f826d3afead6e4df521f7972a4bef04a72efb

https://git.kernel.org/stable/c/1b5de7d44890b78519acbcc80d8d1f23ff2872e5

https://git.kernel.org/stable/c/02df3170c04a8356cd571ab9155a42f030190abc

Details

Source: Mitre, NVD

Published: 2024-05-21

Updated: 2024-05-21

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium