In the Linux kernel, the following vulnerability has been resolved:
Input: iforce - invert valid length check when fetching device IDs
syzbot is reporting uninitialized value at iforce_init_device() [1], for
commit 6ac0aec6b0a6 ("Input: iforce - allow callers supply data buffer
when fetching device IDs") is checking that valid length is shorter than
bytes to read. Since iforce_get_id_packet() stores valid length when
returning 0, the caller needs to check that valid length is longer than or
equals to bytes to read.
References
Configurations
Configuration 1 (hide)
|
History
05 Nov 2025, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/24cc679abbf31477d0cc6106ec83c2fbae6b3cdf - Patch | |
| References | () https://git.kernel.org/stable/c/5d53797ce7ce8fb1d95a5bebc5efa9418c4217a3 - Patch | |
| References | () https://git.kernel.org/stable/c/6365569d62a75ddf53fb0c2936c16587a365984c - Patch | |
| References | () https://git.kernel.org/stable/c/b8ebf250997c5fb253582f42bfe98673801ebebd - Patch | |
| References | () https://git.kernel.org/stable/c/fdd57c20d4408cac3c3c535c120d244e083406c9 - Patch | |
| Summary |
|
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* |
|
| CWE | CWE-908 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
01 May 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-01 15:16
Updated : 2025-11-05 15:17
NVD link : CVE-2022-49790
Mitre link : CVE-2022-49790
CVE.ORG link : CVE-2022-49790
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-908
Use of Uninitialized Resource
