{"id":"CVE-2022-49790","summary":"Input: iforce - invert valid length check when fetching device IDs","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: iforce - invert valid length check when fetching device IDs\n\nsyzbot is reporting uninitialized value at iforce_init_device() [1], for\ncommit 6ac0aec6b0a6 (\"Input: iforce - allow callers supply data buffer\nwhen fetching device IDs\") is checking that valid length is shorter than\nbytes to read. Since iforce_get_id_packet() stores valid length when\nreturning 0, the caller needs to check that valid length is longer than or\nequals to bytes to read.","modified":"2026-04-03T13:14:46.160322Z","published":"2025-05-01T14:09:22.158Z","related":["SUSE-SU-2025:01918-1","SUSE-SU-2025:01966-1","SUSE-SU-2025:01982-1","SUSE-SU-2025:01995-1","SUSE-SU-2025:02173-1","SUSE-SU-2025:02262-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49790.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/24cc679abbf31477d0cc6106ec83c2fbae6b3cdf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5d53797ce7ce8fb1d95a5bebc5efa9418c4217a3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6365569d62a75ddf53fb0c2936c16587a365984c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8ebf250997c5fb253582f42bfe98673801ebebd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fdd57c20d4408cac3c3c535c120d244e083406c9"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49790.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49790"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6ac0aec6b0a651d64eef759fddf17d9145b51033"},{"fixed":"5d53797ce7ce8fb1d95a5bebc5efa9418c4217a3"},{"fixed":"24cc679abbf31477d0cc6106ec83c2fbae6b3cdf"},{"fixed":"fdd57c20d4408cac3c3c535c120d244e083406c9"},{"fixed":"6365569d62a75ddf53fb0c2936c16587a365984c"},{"fixed":"b8ebf250997c5fb253582f42bfe98673801ebebd"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49790.json"}}],"schema_version":"1.7.5"}