In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait
While performing fast composition switch, there is a possibility that the
process of ffs_ep0_write/ffs_ep0_read get into a race condition
due to ep0req being freed up from functionfs_unbind.
Consider the scenario that the ffs_ep0_write calls the ffs_ep0_queue_wait
by taking a lock &ffs->ev.waitq.lock. However, the functionfs_unbind isn't
bounded so it can go ahead and mark the ep0req to NULL, and since there
is no NULL check in ffs_ep0_queue_wait we will end up in use-after-free.
Fix this by making a serialized execution between the two functions using
a mutex_lock(ffs->mutex).
References
Configurations
Configuration 1 (hide)
|
History
01 Apr 2025, 15:40
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:* |
|
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/6a19da111057f69214b97c62fb0ac59023970850 - Patch | |
References | () https://git.kernel.org/stable/c/6aee197b7fbcd61596a78b47d553f2f99111f217 - Patch | |
References | () https://git.kernel.org/stable/c/6dd9ea05534f323668db94fcc2726c7a84547e78 - Patch | |
References | () https://git.kernel.org/stable/c/a8d40942df074f4ebcb9bd3413596d92f323b064 - Patch | |
References | () https://git.kernel.org/stable/c/ae8e136bcaae96163b5821984de1036efc9abb1a - Patch | |
References | () https://git.kernel.org/stable/c/e9036e951f93fb8d7b5e9d6e2c7f94a4da312ae4 - Patch | |
References | () https://git.kernel.org/stable/c/facf353c9e8d7885b686d9a4b173d4e0af6441d2 - Patch |
28 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
27 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-27 17:15
Updated : 2025-04-01 15:40
NVD link : CVE-2022-49755
Mitre link : CVE-2022-49755
CVE.ORG link : CVE-2022-49755
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free