CVE-2022-49755

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait While performing fast composition switch, there is a possibility that the process of ffs_ep0_write/ffs_ep0_read get into a race condition due to ep0req being freed up from functionfs_unbind. Consider the scenario that the ffs_ep0_write calls the ffs_ep0_queue_wait by taking a lock &ffs->ev.waitq.lock. However, the functionfs_unbind isn't bounded so it can go ahead and mark the ep0req to NULL, and since there is no NULL check in ffs_ep0_queue_wait we will end up in use-after-free. Fix this by making a serialized execution between the two functions using a mutex_lock(ffs->mutex).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*

History

01 Apr 2025, 15:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: f_fs: Evitar ejecución durante ffs_ep0_queue_wait Mientras se realiza un cambio de composición rápida, existe la posibilidad de que el proceso de ffs_ep0_write/ffs_ep0_read entre en una condición de ejecución debido a que ep0req se libera de functionfs_unbind. Considere el escenario en el que ffs_ep0_write llama a ffs_ep0_queue_wait tomando un bloqueo &ffs->ev.waitq.lock. Sin embargo, functionfs_unbind no está limitada, por lo que puede seguir adelante y marcar ep0req como NULL, y dado que no hay una comprobación de NULL en ffs_ep0_queue_wait, terminaremos en use-after-free. Solucione esto realizando una ejecución serializada entre las dos funciones usando un mutex_lock(ffs->mutex).
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/6a19da111057f69214b97c62fb0ac59023970850 - () https://git.kernel.org/stable/c/6a19da111057f69214b97c62fb0ac59023970850 - Patch
References () https://git.kernel.org/stable/c/6aee197b7fbcd61596a78b47d553f2f99111f217 - () https://git.kernel.org/stable/c/6aee197b7fbcd61596a78b47d553f2f99111f217 - Patch
References () https://git.kernel.org/stable/c/6dd9ea05534f323668db94fcc2726c7a84547e78 - () https://git.kernel.org/stable/c/6dd9ea05534f323668db94fcc2726c7a84547e78 - Patch
References () https://git.kernel.org/stable/c/a8d40942df074f4ebcb9bd3413596d92f323b064 - () https://git.kernel.org/stable/c/a8d40942df074f4ebcb9bd3413596d92f323b064 - Patch
References () https://git.kernel.org/stable/c/ae8e136bcaae96163b5821984de1036efc9abb1a - () https://git.kernel.org/stable/c/ae8e136bcaae96163b5821984de1036efc9abb1a - Patch
References () https://git.kernel.org/stable/c/e9036e951f93fb8d7b5e9d6e2c7f94a4da312ae4 - () https://git.kernel.org/stable/c/e9036e951f93fb8d7b5e9d6e2c7f94a4da312ae4 - Patch
References () https://git.kernel.org/stable/c/facf353c9e8d7885b686d9a4b173d4e0af6441d2 - () https://git.kernel.org/stable/c/facf353c9e8d7885b686d9a4b173d4e0af6441d2 - Patch

28 Mar 2025, 16:15

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

27 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-27 17:15

Updated : 2025-04-01 15:40


NVD link : CVE-2022-49755

Mitre link : CVE-2022-49755

CVE.ORG link : CVE-2022-49755


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free