-

CVE-2022-50220

In the Linux kernel, the following vulnerability has been resolved:

usbnet: Fix linkwatch use-after-free on disconnect

usbnet uses the work usbnet_deferred_kevent() to perform tasks which may
sleep.  On disconnect, completion of the work was originally awaited in
->ndo_stop().  But in 2003, that was moved to ->disconnect() by historic
commit "[PATCH] USB: usbnet, prevent exotic rtnl deadlock":

  https://git.kernel.org/tglx/history/c/0f138bbfd83c

The change was made because back then, the kernel's workqueue
implementation did not allow waiting for a single work.  One had to wait
for completion of *all* work by calling flush_scheduled_work(), and that
could deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex
held in ->ndo_stop().

The commit solved one problem but created another:  It causes a
use-after-free in USB Ethernet drivers aqc111.c, asix_devices.c,
ax88179_178a.c, ch9200.c and smsc75xx.c:

* If the drivers receive a link change interrupt immediately before
  disconnect, they raise EVENT_LINK_RESET in their (non-sleepable)
  ->status() callback and schedule usbnet_deferred_kevent().
* usbnet_deferred_kevent() invokes the driver's ->link_reset() callback,
  which calls netif_carrier_{on,off}().
* That in turn schedules the work linkwatch_event().

Because usbnet_deferred_kevent() is awaited after unregister_netdev(),
netif_carrier_{on,off}() may operate on an unregistered netdev and
linkwatch_event() may run after free_netdev(), causing a use-after-free.

In 2010, usbnet was changed to only wait for a single instance of
usbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf
("drivers/net: don't use flush_scheduled_work()").

Unfortunately the commit neglected to move the wait back to
->ndo_stop().  Rectify that omission at long last.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < d2d6b530d89b0a912148018027386aa049f0a309
Version 23f333a2bfafba80339315b724808982a9de57d9
Status affected
Version < e2a521a7dcc463c5017b4426ca0804e151faeff7
Version 23f333a2bfafba80339315b724808982a9de57d9
Status affected
Version < 7f77dcbc030c2faa6d8e8a594985eeb34018409e
Version 23f333a2bfafba80339315b724808982a9de57d9
Status affected
Version < 8b4588b8b00b299be16a35be67b331d8fdba03f3
Version 23f333a2bfafba80339315b724808982a9de57d9
Status affected
Version < 135199a2edd459d2b123144efcd7f9bcd95128e4
Version 23f333a2bfafba80339315b724808982a9de57d9
Status affected
Version < 635fd8953e4309b54ca6a81bed1d4a87668694f4
Version 23f333a2bfafba80339315b724808982a9de57d9
Status affected
Version < d49bb8cf9bfaa06aa527eb30f1a52a071da2e32f
Version 23f333a2bfafba80339315b724808982a9de57d9
Status affected
Version < db3b738ae5f726204876f4303c49cfdf4311403f
Version 23f333a2bfafba80339315b724808982a9de57d9
Status affected
Version < a69e617e533edddf3fa3123149900f36e0a6dc74
Version 23f333a2bfafba80339315b724808982a9de57d9
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.38
Status affected
Version < 2.6.38
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.326
Status unaffected
Version <= 4.14.*
Version 4.14.291
Status unaffected
Version <= 4.19.*
Version 4.19.256
Status unaffected
Version <= 5.4.*
Version 5.4.211
Status unaffected
Version <= 5.10.*
Version 5.10.137
Status unaffected
Version <= 5.15.*
Version 5.15.61
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.147
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string