In the Linux kernel, the following vulnerability has been resolved:
Input: iforce - invert valid length check when fetching device IDs
syzbot is reporting uninitialized value at iforce_init_device() [1], for
commit 6ac0aec6b0a6 ("Input: iforce - allow callers supply data buffer
when fetching device IDs") is checking that valid length is shorter than
bytes to read. Since iforce_get_id_packet() stores valid length when
returning 0, the caller needs to check that valid length is longer than or
equals to bytes to read.
Metrics
Affected Vendors & Products
References
History
Fri, 02 May 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 01 May 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: Input: iforce - invert valid length check when fetching device IDs syzbot is reporting uninitialized value at iforce_init_device() [1], for commit 6ac0aec6b0a6 ("Input: iforce - allow callers supply data buffer when fetching device IDs") is checking that valid length is shorter than bytes to read. Since iforce_get_id_packet() stores valid length when returning 0, the caller needs to check that valid length is longer than or equals to bytes to read. | |
Title | Input: iforce - invert valid length check when fetching device IDs | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-01T14:09:22.158Z
Updated: 2025-05-04T08:45:25.494Z
Reserved: 2025-05-01T14:05:17.224Z
Link: CVE-2022-49790

No data.

Status : Awaiting Analysis
Published: 2025-05-01T15:16:02.260
Modified: 2025-05-02T13:53:20.943
Link: CVE-2022-49790
