-

CVE-2022-50876

In the Linux kernel, the following vulnerability has been resolved:

usb: musb: Fix musb_gadget.c rxstate overflow bug

The usb function device call musb_gadget_queue() adds the passed
request to musb_ep::req_list,If the (request->length > musb_ep->packet_sz)
and (is_buffer_mapped(req) return false),the rxstate() will copy all data
in fifo to request->buf which may cause request->buf out of bounds.

Fix it by add the length check :
fifocnt = min_t(unsigned, request->length - request->actual, fifocnt);
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 826f84ab04a5cafe484ea9c2c85a3930068e5cb7
Version 03840fad004ce8a56bc8b3bb60a2df10f6f9481e
Status affected
Version < a1008c8b9f357691ce6a8fdb8f157aecb2d79167
Version 03840fad004ce8a56bc8b3bb60a2df10f6f9481e
Status affected
Version < 7c80f3a918ba9aa26fb699ee887064ec3af0396a
Version 03840fad004ce8a56bc8b3bb60a2df10f6f9481e
Status affected
Version < d6afcab1b48f4051211c50145b9e91be3b1b42c9
Version 03840fad004ce8a56bc8b3bb60a2df10f6f9481e
Status affected
Version < acf0006f2b2b2ca672988875fd154429aafb2a9b
Version 03840fad004ce8a56bc8b3bb60a2df10f6f9481e
Status affected
Version < 3c84c7f592c4ba38f54ddaddd0115acc443025db
Version 03840fad004ce8a56bc8b3bb60a2df10f6f9481e
Status affected
Version < a9ccd2ab1becf5dcb6d57e9fcd981f5eaa606c96
Version 03840fad004ce8a56bc8b3bb60a2df10f6f9481e
Status affected
Version < 523313881f0aa5cbbdb548ce575b6e58b202bd76
Version 03840fad004ce8a56bc8b3bb60a2df10f6f9481e
Status affected
Version < eea4c860c3b366369eff0489d94ee4f0571d467d
Version 03840fad004ce8a56bc8b3bb60a2df10f6f9481e
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.3
Status affected
Version < 4.3
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.145
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.