In the Linux kernel, the following vulnerability has been resolved:
usb: aqc111: check packet for fixup for true limit
If a device sends a packet that is inbetween 0
and sizeof(u64) the value passed to skb_trim()
as length will wrap around ending up as some very
large value.
The driver will then proceed to parse the header
located at that position, which will either oops or
process some random value.
The fix is to check against sizeof(u64) rather than
0, which the driver currently does. The issue exists
since the introduction of the driver.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Sep 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-467 |
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-13T10:20:01.160Z
Updated: 2024-11-04T14:50:32.775Z
Reserved: 2024-03-06T09:52:12.099Z
Link: CVE-2023-52655
Vulnrichment
Updated: 2024-08-02T23:03:21.350Z
NVD
Status : Awaiting Analysis
Published: 2024-05-14T14:23:13.467
Modified: 2024-05-14T16:13:02.773
Link: CVE-2023-52655
Redhat