cve-2022-48805
Vulnerability from cvelistv5
Published
2024-07-16 11:43
Modified
2024-11-04 12:16
Severity ?
Summary
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb
Impacted products
Vendor Product Version
Linux Linux Version: 3.9
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:25:01.769Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-48805",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:58:50.903350Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:34:13.907Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/usb/ax88179_178a.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "711b6bf3fb05",
              "status": "affected",
              "version": "e2ca90c276e1",
              "versionType": "git"
            },
            {
              "lessThan": "63f0cfb36c1f",
              "status": "affected",
              "version": "e2ca90c276e1",
              "versionType": "git"
            },
            {
              "lessThan": "1668781ed24d",
              "status": "affected",
              "version": "e2ca90c276e1",
              "versionType": "git"
            },
            {
              "lessThan": "a0fd5492ee76",
              "status": "affected",
              "version": "e2ca90c276e1",
              "versionType": "git"
            },
            {
              "lessThan": "758290defe93",
              "status": "affected",
              "version": "e2ca90c276e1",
              "versionType": "git"
            },
            {
              "lessThan": "ffd0393adcdc",
              "status": "affected",
              "version": "e2ca90c276e1",
              "versionType": "git"
            },
            {
              "lessThan": "9681823f96a8",
              "status": "affected",
              "version": "e2ca90c276e1",
              "versionType": "git"
            },
            {
              "lessThan": "57bc3d3ae8c1",
              "status": "affected",
              "version": "e2ca90c276e1",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/usb/ax88179_178a.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.9"
            },
            {
              "lessThan": "3.9",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.303",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.268",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.231",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.180",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.101",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.24",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.16.*",
              "status": "unaffected",
              "version": "5.16.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.17",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup\n\nax88179_rx_fixup() contains several out-of-bounds accesses that can be\ntriggered by a malicious (or defective) USB device, in particular:\n\n - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,\n   causing OOB reads and (on big-endian systems) OOB endianness flips.\n - A packet can overlap the metadata array, causing a later OOB\n   endianness flip to corrupt data used by a cloned SKB that has already\n   been handed off into the network stack.\n - A packet SKB can be constructed whose tail is far beyond its end,\n   causing out-of-bounds heap data to be considered part of the SKB\u0027s\n   data.\n\nI have tested that this can be used by a malicious USB device to send a\nbogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response\nthat contains random kernel heap data.\nIt\u0027s probably also possible to get OOB writes from this on a\nlittle-endian system somehow - maybe by triggering skb_cow() via IP\noptions processing -, but I haven\u0027t tested that."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T12:16:55.129Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382"
        },
        {
          "url": "https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740"
        },
        {
          "url": "https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930"
        },
        {
          "url": "https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d"
        },
        {
          "url": "https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d"
        },
        {
          "url": "https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb"
        },
        {
          "url": "https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274"
        },
        {
          "url": "https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581"
        }
      ],
      "title": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-48805",
    "datePublished": "2024-07-16T11:43:56.950Z",
    "dateReserved": "2024-07-16T11:38:08.896Z",
    "dateUpdated": "2024-11-04T12:16:55.129Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-48805\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-16T12:15:04.907\",\"lastModified\":\"2024-11-21T07:34:07.360\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup\\n\\nax88179_rx_fixup() contains several out-of-bounds accesses that can be\\ntriggered by a malicious (or defective) USB device, in particular:\\n\\n - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,\\n   causing OOB reads and (on big-endian systems) OOB endianness flips.\\n - A packet can overlap the metadata array, causing a later OOB\\n   endianness flip to corrupt data used by a cloned SKB that has already\\n   been handed off into the network stack.\\n - A packet SKB can be constructed whose tail is far beyond its end,\\n   causing out-of-bounds heap data to be considered part of the SKB\u0027s\\n   data.\\n\\nI have tested that this can be used by a malicious USB device to send a\\nbogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response\\nthat contains random kernel heap data.\\nIt\u0027s probably also possible to get OOB writes from this on a\\nlittle-endian system somehow - maybe by triggering skb_cow() via IP\\noptions processing -, but I haven\u0027t tested that.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: usb: ax88179_178a: Reparar accesos fuera de los l\u00edmites en RX fixup ax88179_rx_fixup() contiene varios accesos fuera de los l\u00edmites que pueden ser activados por un archivo malicioso (o defectuoso). Dispositivo USB, en particular: - La matriz de metadatos (hdr_off..hdr_off+2*pkt_cnt) puede estar fuera de los l\u00edmites, provocando lecturas OOB y (en sistemas big-endian) cambios de endianidad OOB. - Un paquete puede superponerse a la matriz de metadatos, lo que provoca un cambio de endianidad OOB posterior que corrompe los datos utilizados por un SKB clonado que ya se ha transferido a la pila de red. - Se puede construir un paquete SKB cuya cola est\u00e9 mucho m\u00e1s all\u00e1 de su extremo, lo que hace que los datos del mont\u00f3n fuera de los l\u00edmites se consideren parte de los datos del SKB. He probado que esto puede ser utilizado por un dispositivo USB malicioso para enviar una solicitud de eco ICMPv6 falsa y recibir una respuesta de eco ICMPv6 en respuesta que contiene datos aleatorios del mont\u00f3n del kernel. Probablemente tambi\u00e9n sea posible obtener escrituras OOB a partir de esto en un sistema little-endian de alguna manera, tal vez activando skb_cow() a trav\u00e9s del procesamiento de opciones de IP, pero no lo he probado.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.