CVE-2022-48948

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
21/10/2024
Last modified:
29/10/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: gadget: uvc: Prevent buffer overflow in setup handler<br /> <br /> Setup function uvc_function_setup permits control transfer<br /> requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE),<br /> data stage handler for OUT transfer uses memcpy to copy req-&gt;actual<br /> bytes to uvc_event-&gt;data.data array of size 60. This may result<br /> in an overflow of 4 bytes.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.35 (including) 4.9.337 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.303 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.270 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.229 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.161 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.85 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.0.15 (excluding)
cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*