Количество 11
Количество 11
BDU:2025-01694
Уязвимость компонента usb ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе
CVE-2022-48948
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. This may result in an overflow of 4 bytes.
CVE-2022-48948
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. This may result in an overflow of 4 bytes.
CVE-2022-48948
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. This may result in an overflow of 4 bytes.
CVE-2022-48948
In the Linux kernel, the following vulnerability has been resolved: u ...
GHSA-hvf3-fq2g-9gmg
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. This may result in an overflow of 4 bytes.
ROS-20250211-01
Множественные уязвимости kernel-lt
SUSE-SU-2024:4131-1
Security update for the Linux Kernel
SUSE-SU-2024:3983-1
Security update for the Linux Kernel
SUSE-SU-2024:3985-1
Security update for the Linux Kernel
SUSE-SU-2024:4364-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-01694 Уязвимость компонента usb ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
CVE-2022-48948 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. This may result in an overflow of 4 bytes. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2022-48948 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. This may result in an overflow of 4 bytes. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2022-48948 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. This may result in an overflow of 4 bytes. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2022-48948 In the Linux kernel, the following vulnerability has been resolved: u ... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
GHSA-hvf3-fq2g-9gmg In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. This may result in an overflow of 4 bytes. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
ROS-20250211-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 9 месяцев назад | ||
SUSE-SU-2024:4131-1 Security update for the Linux Kernel | 12 месяцев назад | |||
SUSE-SU-2024:3983-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3985-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:4364-1 Security update for the Linux Kernel | 11 месяцев назад |
Уязвимостей на страницу