Bug 2320677 (CVE-2022-48948) - CVE-2022-48948 kernel: usb: gadget: uvc: Prevent buffer overflow in setup handler
Summary: CVE-2022-48948 kernel: usb: gadget: uvc: Prevent buffer overflow in setup han...
Keywords:
Status: NEW
Alias: CVE-2022-48948
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-10-21 21:02 UTC by OSIDB Bzimport
Modified: 2024-10-22 13:29 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-10-21 21:02:10 UTC
In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: uvc: Prevent buffer overflow in setup handler

Setup function uvc_function_setup permits control transfer
requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE),
data stage handler for OUT transfer uses memcpy to copy req->actual
bytes to uvc_event->data.data array of size 60. This may result
in an overflow of 4 bytes.

Comment 1 Avinash Hanwate 2024-10-22 08:34:33 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48948-588a@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.