mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
Update CVE-2021-42553.json
This commit is contained in:
parent
8393c23899
commit
79195d2507
@ -16,8 +16,9 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "all",
|
||||
"version_value": "all"
|
||||
"version_value": "3.5.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -42,7 +43,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A buffer overflow vulnerability in stm32_mw_usb_host of STMicroelectronics allows an attacker to execute arbitrary code when the descriptor contains more endpoints than USBH_MAX_NUM_ENDPOINTS. The library is typically integrated when using a RTOS such as FreeRTOS on STM32 MCUs."
|
||||
"value": "A buffer overflow vulnerability in stm32_mw_usb_host of STMicroelectronics in versions before 3.5.1 allows an attacker to execute arbitrary code when the descriptor contains more endpoints than USBH_MAX_NUM_ENDPOINTS. The library is typically integrated when using a RTOS such as FreeRTOS on STM32 MCUs."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -83,10 +84,15 @@
|
||||
"name": "https://github.com/STMicroelectronics/stm32_mw_usb_host/pull/4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/STMicroelectronics/stm32_mw_usb_host/pull/4"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/STMicroelectronics/stm32_mw_usb_host",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/STMicroelectronics/stm32_mw_usb_host"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user