In the Linux kernel, the following vulnerability has been resolved:
media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
The buffer length check before calling uvc_parse_format() only ensured that the buffer has at least 3 bytes (buflen > 2), buf the function accesses buffer[3], requiring at least 4 bytes.
This can lead to an out-of-bounds read if the buffer has exactly 3 bytes.
Fix it by checking that the buffer has at least 4 bytes in uvc_parse_format().
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 2.6.27 | 5.4.297 |
| linux / linux_kernel | 5.5 | 5.10.241 |
| linux / linux_kernel | 5.11 | 5.15.190 |
| linux / linux_kernel | 5.16 | 6.1.149 |
| linux / linux_kernel | 6.2 | 6.6.103 |
| linux / linux_kernel | 6.7 | 6.12.43 |
| linux / linux_kernel | 6.13 | 6.15.11 |
| linux / linux_kernel | 6.16 | 6.16.2 |
| linux / linux_kernel | 2.6.26 | 2.6.26.x |
| linux / linux_kernel | 2.6.26-rc9 | 2.6.26-rc9.x |
| debian / debian_linux | 11.0 | 11.0.x |