In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: uvc: Prevent buffer overflow in setup handler
Setup function uvc_function_setup permits control transfer
requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE),
data stage handler for OUT transfer uses memcpy to copy req->actual
bytes to uvc_event->data.data array of size 60. This may result
in an overflow of 4 bytes.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-10-21 20:15
Updated : 2024-10-29 16:34
NVD link : CVE-2022-48948
Mitre link : CVE-2022-48948
CVE.ORG link : CVE-2022-48948
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')