cve-2022-48805
Vulnerability from cvelistv5
Published
2024-07-16 11:43
Modified
2024-11-04 12:16
Severity ?
EPSS score ?
Summary
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:25:01.769Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48805", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:58:50.903350Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:13.907Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/usb/ax88179_178a.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "711b6bf3fb05", "status": "affected", "version": "e2ca90c276e1", "versionType": "git" }, { "lessThan": "63f0cfb36c1f", "status": "affected", "version": "e2ca90c276e1", "versionType": "git" }, { "lessThan": "1668781ed24d", "status": "affected", "version": "e2ca90c276e1", "versionType": "git" }, { "lessThan": "a0fd5492ee76", "status": "affected", "version": "e2ca90c276e1", "versionType": "git" }, { "lessThan": "758290defe93", "status": "affected", "version": "e2ca90c276e1", "versionType": "git" }, { "lessThan": "ffd0393adcdc", "status": "affected", "version": "e2ca90c276e1", "versionType": "git" }, { "lessThan": "9681823f96a8", "status": "affected", "version": "e2ca90c276e1", "versionType": "git" }, { "lessThan": "57bc3d3ae8c1", "status": "affected", "version": "e2ca90c276e1", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/usb/ax88179_178a.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "3.9" }, { "lessThan": "3.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.9.*", "status": "unaffected", "version": "4.9.303", "versionType": "semver" }, { "lessThanOrEqual": "4.14.*", "status": "unaffected", "version": "4.14.268", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.231", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.180", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.101", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.24", "versionType": "semver" }, { "lessThanOrEqual": "5.16.*", "status": "unaffected", "version": "5.16.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "5.17", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup\n\nax88179_rx_fixup() contains several out-of-bounds accesses that can be\ntriggered by a malicious (or defective) USB device, in particular:\n\n - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,\n causing OOB reads and (on big-endian systems) OOB endianness flips.\n - A packet can overlap the metadata array, causing a later OOB\n endianness flip to corrupt data used by a cloned SKB that has already\n been handed off into the network stack.\n - A packet SKB can be constructed whose tail is far beyond its end,\n causing out-of-bounds heap data to be considered part of the SKB\u0027s\n data.\n\nI have tested that this can be used by a malicious USB device to send a\nbogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response\nthat contains random kernel heap data.\nIt\u0027s probably also possible to get OOB writes from this on a\nlittle-endian system somehow - maybe by triggering skb_cow() via IP\noptions processing -, but I haven\u0027t tested that." } ], "providerMetadata": { "dateUpdated": "2024-11-04T12:16:55.129Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382" }, { "url": "https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740" }, { "url": "https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930" }, { "url": "https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d" }, { "url": "https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d" }, { "url": "https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb" }, { "url": "https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274" }, { "url": "https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581" } ], "title": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2022-48805", "datePublished": "2024-07-16T11:43:56.950Z", "dateReserved": "2024-07-16T11:38:08.896Z", "dateUpdated": "2024-11-04T12:16:55.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-48805\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-16T12:15:04.907\",\"lastModified\":\"2024-11-21T07:34:07.360\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup\\n\\nax88179_rx_fixup() contains several out-of-bounds accesses that can be\\ntriggered by a malicious (or defective) USB device, in particular:\\n\\n - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,\\n causing OOB reads and (on big-endian systems) OOB endianness flips.\\n - A packet can overlap the metadata array, causing a later OOB\\n endianness flip to corrupt data used by a cloned SKB that has already\\n been handed off into the network stack.\\n - A packet SKB can be constructed whose tail is far beyond its end,\\n causing out-of-bounds heap data to be considered part of the SKB\u0027s\\n data.\\n\\nI have tested that this can be used by a malicious USB device to send a\\nbogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response\\nthat contains random kernel heap data.\\nIt\u0027s probably also possible to get OOB writes from this on a\\nlittle-endian system somehow - maybe by triggering skb_cow() via IP\\noptions processing -, but I haven\u0027t tested that.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: usb: ax88179_178a: Reparar accesos fuera de los l\u00edmites en RX fixup ax88179_rx_fixup() contiene varios accesos fuera de los l\u00edmites que pueden ser activados por un archivo malicioso (o defectuoso). Dispositivo USB, en particular: - La matriz de metadatos (hdr_off..hdr_off+2*pkt_cnt) puede estar fuera de los l\u00edmites, provocando lecturas OOB y (en sistemas big-endian) cambios de endianidad OOB. - Un paquete puede superponerse a la matriz de metadatos, lo que provoca un cambio de endianidad OOB posterior que corrompe los datos utilizados por un SKB clonado que ya se ha transferido a la pila de red. - Se puede construir un paquete SKB cuya cola est\u00e9 mucho m\u00e1s all\u00e1 de su extremo, lo que hace que los datos del mont\u00f3n fuera de los l\u00edmites se consideren parte de los datos del SKB. He probado que esto puede ser utilizado por un dispositivo USB malicioso para enviar una solicitud de eco ICMPv6 falsa y recibir una respuesta de eco ICMPv6 en respuesta que contiene datos aleatorios del mont\u00f3n del kernel. Probablemente tambi\u00e9n sea posible obtener escrituras OOB a partir de esto en un sistema little-endian de alguna manera, tal vez activando skb_cow() a trav\u00e9s del procesamiento de opciones de IP, pero no lo he probado.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.