Executive Summary

Informations
Name CVE-2022-48926 First vendor Publication 2024-08-22
Vendor Cve Last vendor Modification 2024-08-23

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: rndis: add spinlock for rndis response list

There's no lock for rndis response list. It could cause list corruption if there're two different list_add at the same time like below. It's better to add in rndis_add_response / rndis_free_response / rndis_get_next_response to prevent any race condition on response list.

[ 361.894299] [1: irq/191-dwc3:16979] list_add corruption. next->prev should be prev (ffffff80651764d0), but was ffffff883dc36f80. (next=ffffff80651764d0).

[ 361.904380] [1: irq/191-dwc3:16979] Call trace: [ 361.904391] [1: irq/191-dwc3:16979] __list_add_valid+0x74/0x90 [ 361.904401] [1: irq/191-dwc3:16979] rndis_msg_parser+0x168/0x8c0 [ 361.904409] [1: irq/191-dwc3:16979] rndis_command_complete+0x24/0x84 [ 361.904417] [1: irq/191-dwc3:16979] usb_gadget_giveback_request+0x20/0xe4 [ 361.904426] [1: irq/191-dwc3:16979] dwc3_gadget_giveback+0x44/0x60 [ 361.904434] [1: irq/191-dwc3:16979] dwc3_ep0_complete_data+0x1e8/0x3a0 [ 361.904442] [1: irq/191-dwc3:16979] dwc3_ep0_interrupt+0x29c/0x3dc [ 361.904450] [1: irq/191-dwc3:16979] dwc3_process_event_entry+0x78/0x6cc [ 361.904457] [1: irq/191-dwc3:16979] dwc3_process_event_buf+0xa0/0x1ec [ 361.904465] [1: irq/191-dwc3:16979] dwc3_thread_interrupt+0x34/0x5c

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48926

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3504

Sources (Detail)

https://git.kernel.org/stable/c/33222d1571d7ce8c1c75f6b488f38968fa93d2d9
https://git.kernel.org/stable/c/4ce247af3f30078d5b97554f1ae6200a0222c15a
https://git.kernel.org/stable/c/669c2b178956718407af5631ccbc61c24413f038
https://git.kernel.org/stable/c/9ab652d41deab49848673c3dadb57ad338485376
https://git.kernel.org/stable/c/9f5d8ba538ef81cd86ea587ca3f8c77e26bea405
https://git.kernel.org/stable/c/9f688aadede6b862a0a898792b1a35421c93636f
https://git.kernel.org/stable/c/aaaba1c86d04dac8e49bf508b492f81506257da3
https://git.kernel.org/stable/c/da514063440b53a27309a4528b726f92c3cfe56f
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Date Informations
2025-01-08 02:47:31
  • Multiple Updates
2025-01-07 02:47:07
  • Multiple Updates
2024-12-25 02:45:54
  • Multiple Updates
2024-12-12 02:48:48
  • Multiple Updates
2024-11-22 02:46:12
  • Multiple Updates
2024-11-20 02:43:36
  • Multiple Updates
2024-11-14 02:43:29
  • Multiple Updates
2024-11-09 02:44:07
  • Multiple Updates
2024-10-26 02:41:53
  • Multiple Updates
2024-10-25 02:43:39
  • Multiple Updates
2024-10-23 02:43:03
  • Multiple Updates
2024-10-03 02:39:06
  • Multiple Updates
2024-10-02 02:37:30
  • Multiple Updates
2024-09-04 02:36:46
  • Multiple Updates
2024-08-23 09:27:34
  • Multiple Updates
2024-08-23 02:48:13
  • Multiple Updates
2024-08-23 02:34:45
  • Multiple Updates
2024-08-22 17:27:24
  • Multiple Updates
2024-08-22 09:27:25
  • First insertion