Description
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. This may result in an overflow of 4 bytes.
References (9)
Core 9
Core References
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
3.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (10)
linux/Kernel
2.6.35 - 4.9.337linux
linux/Kernel
4.10.0 - 4.14.303linux
linux/Kernel
4.15.0 - 4.19.270linux
linux/Kernel
4.20.0 - 5.4.229linux
linux/Kernel
5.11.0 - 5.15.85linux
linux/Kernel
5.16.0 - 6.0.15linux
linux/Kernel
5.5.0 - 5.10.161linux
linux/Kernel
6.1.0 - 6.1.1linux
linux/linux_kernel
6.1
linux/linux_kernel
2.6.35 - 4.9.337
Published
Oct 21, 2024
Tracked Since
Feb 18, 2026