Updated: 2026-02-08 04:04:58.653342
Description:
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() The buffer length check before calling uvc_parse_format() only ensured that the buffer has at least 3 bytes (buflen > 2), buf the function accesses buffer[3], requiring at least 4 bytes. This can lead to an out-of-bounds read if the buffer has exactly 3 bytes. Fix it by checking that the buffer has at least 4 bytes in uvc_parse_format().
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.1 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| RHEL 7 ELS | kernel | 3.10.0 | 7.1 | HIGH | Needs Triage | 2026-02-04 10:07:55 | ||
| TuxCare 9.6 ESU | kernel | 5.14.0 | 7.1 | HIGH | Released | CLSA-2026:1771081379 | 2026-02-14 20:11:25 | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.1 | HIGH | Needs Triage | 2026-02-04 08:52:50 | ||
| Ubuntu 16.04 ELS | linux | 4.4.0 | 7.1 | HIGH | Needs Triage | 2026-02-04 09:08:21 | ||
| Ubuntu 18.04 ELS | linux | 4.15.0 | 7.1 | HIGH | Needs Triage | 2026-02-04 09:08:17 | ||
| Ubuntu 20.04 ELS | linux | 5.4.0 | 7.1 | HIGH | Needs Triage | 2026-02-04 09:08:19 |