
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability (CVE-2022-50156) was discovered in the Linux kernel's HID cp2112 driver. The vulnerability was identified in the cp2112xfer() function where the 'readlength' variable, which is provided by user input through 'data->block[0]', can take values between 0-255 without proper bounds checking (NVD, Wiz).
The vulnerability exists in the drivers/hid/hid-cp2112.c file, specifically in the cp2112xfer() function at line 793. Two Smatch warnings were identified: one for 'data->block[1]' being too small (33 vs 255) and another for 'buf' being too small (64 vs 255). The issue stems from insufficient validation of the 'readlength' variable which is provided by user input through 'data->block[0]' (NVD).
The buffer overflow vulnerability could allow an attacker to write beyond the intended buffer boundaries, potentially leading to memory corruption. This could result in system crashes or potentially arbitrary code execution (Wiz).
The vulnerability has been patched by adding an upper bound to the 'read_length' variable to prevent buffer overflow in the memcpy() operation. Users should update their Linux kernel to a version that includes this fix (Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."