An attacker can access kernel memory bypassing valid buffer boundaries by exploiting implementation of control request handlers in the following usb gadgets - rndis, hid, uac1, uac1_legacy and uac2. Processing of malicious control transfer requests with unexpectedly large wLength lacks assurance that this value does not exceed the buffer size. Due to this fact one is capable of reading and/or writing (depending on particular case) up to 65k of kernel memory. Reference: https://www.openwall.com/lists/oss-security/2021/12/15/4
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2036101]
This was fixed for Fedora with the 5.15.8 stable kernel update.