2025-06-18 11:03:13
Linux
PUBLISHED
In the Linux kernel, the following vulnerability has been resolved: HID: cp2112: prevent a buffer overflow in cp2112_xfer() Smatch warnings: drivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy() data->block[1] too small (33 vs 255) drivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy() buf too small (64 vs 255) The read_length variable is provided by data->block[0] which comes from user and it(read_length) can take a value between 0-255. Add an upper bound to read_length variable to prevent a buffer overflow in memcpy().