CVE-2022-48948

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. This may result in an overflow of 4 bytes.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*

History

29 Oct 2024, 16:34

Type Values Removed Values Added
CWE CWE-120
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/06fd17ee92c8f1704c7e54ec0fd50ae0542a49a5 - () https://git.kernel.org/stable/c/06fd17ee92c8f1704c7e54ec0fd50ae0542a49a5 - Patch
References () https://git.kernel.org/stable/c/4972e3528b968665b596b5434764ff8fd9446d35 - () https://git.kernel.org/stable/c/4972e3528b968665b596b5434764ff8fd9446d35 - Patch
References () https://git.kernel.org/stable/c/4c92670b16727365699fe4b19ed32013bab2c107 - () https://git.kernel.org/stable/c/4c92670b16727365699fe4b19ed32013bab2c107 - Patch
References () https://git.kernel.org/stable/c/6b41a35b41f77821db24f2d8f66794b390a585c5 - () https://git.kernel.org/stable/c/6b41a35b41f77821db24f2d8f66794b390a585c5 - Patch
References () https://git.kernel.org/stable/c/7b1f773277a72f9756d47a41b94e43506cce1954 - () https://git.kernel.org/stable/c/7b1f773277a72f9756d47a41b94e43506cce1954 - Patch
References () https://git.kernel.org/stable/c/b8fb1cba934ea122b50f13a4f9d6fc4fdc43d2be - () https://git.kernel.org/stable/c/b8fb1cba934ea122b50f13a4f9d6fc4fdc43d2be - Patch
References () https://git.kernel.org/stable/c/bc8380fe5768c564f921f7b4eaba932e330b9e4b - () https://git.kernel.org/stable/c/bc8380fe5768c564f921f7b4eaba932e330b9e4b - Patch
References () https://git.kernel.org/stable/c/c79538f32df12887f110dcd6b9c825b482905f24 - () https://git.kernel.org/stable/c/c79538f32df12887f110dcd6b9c825b482905f24 - Patch
References () https://git.kernel.org/stable/c/d1a92bb8d697f170d93fe922da763d7d156b8841 - () https://git.kernel.org/stable/c/d1a92bb8d697f170d93fe922da763d7d156b8841 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*

23 Oct 2024, 15:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: uvc: Evitar desbordamiento de búfer en el controlador de configuración La función de configuración uvc_function_setup permite solicitudes de transferencia de control con hasta 64 bytes de payload (UVC_MAX_REQUEST_SIZE), el controlador de etapa de datos para transferencia OUT usa memcpy para copiar req->actual bytes a la matriz uvc_event->data.data de tamaño 60. Esto puede resultar en un desbordamiento de 4 bytes.

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-10-29 16:34


NVD link : CVE-2022-48948

Mitre link : CVE-2022-48948

CVE.ORG link : CVE-2022-48948


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')