We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: HID: cp2112: prevent a buffer overflow in cp2112_xfer() Smatch warnings: drivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy() 'data->block[1]' too small (33 vs 255) drivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy() 'buf' too small (64 vs 255) The 'read_length' variable is provided by 'data->block[0]' which comes from user and it(read_length) can take a value between 0-255. Add an upper bound to 'read_length' variable to prevent a buffer overflow in memcpy().
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/3af7d60e9a6c17d6d41c4341f8020511887d372d
git.kernel.org/...c/519ff31a6ddd87aa4905bd9bf3b92e8b88801614
git.kernel.org/...c/ebda3d6b004bb6127a66a616524a2de152302ca7
git.kernel.org/...c/8489a20ac481b08c0391608d81ed3796d373cfdf
git.kernel.org/...c/e7028944e61014ae915e7fb74963d3835f2f761a
git.kernel.org/...c/26e427ac85c2b8d0d108cc80b6de34d33e2780c4
git.kernel.org/...c/381583845d19cb4bd21c8193449385f3fefa9caf
Support options