gadgetdevdescUDCstore in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.
[
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@15753588bcd4bbffae1cca33c8ced5722477fe1f",
"id": "CVE-2020-13143-9c68433f",
"target": {
"file": "drivers/usb/gadget/configfs.c"
},
"digest": {
"line_hashes": [
"306078563863150242508240842779378351876",
"986202477452739519709032237607962261",
"202949398455722510726992563335390712564"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@15753588bcd4bbffae1cca33c8ced5722477fe1f",
"id": "CVE-2020-13143-c2a0c555",
"target": {
"file": "drivers/usb/gadget/configfs.c",
"function": "gadget_dev_desc_UDC_store"
},
"digest": {
"function_hash": "297766609204826963558272632380887272984",
"length": 785.0
},
"signature_type": "Function",
"signature_version": "v1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13143.json"