CVE-2022-48805

In the Linux kernel, the following vulnerability has been resolved: net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup ax88179_rx_fixup() contains several out-of-bounds accesses that can be triggered by a malicious (or defective) USB device, in particular: - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds, causing OOB reads and (on big-endian systems) OOB endianness flips. - A packet can overlap the metadata array, causing a later OOB endianness flip to corrupt data used by a cloned SKB that has already been handed off into the network stack. - A packet SKB can be constructed whose tail is far beyond its end, causing out-of-bounds heap data to be considered part of the SKB's data. I have tested that this can be used by a malicious USB device to send a bogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response that contains random kernel heap data. It's probably also possible to get OOB writes from this on a little-endian system somehow - maybe by triggering skb_cow() via IP options processing -, but I haven't tested that.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*

History

06 Mar 2025, 12:53

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
CWE CWE-125
References () https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930 - () https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930 - Patch
References () https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581 - () https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581 - Patch
References () https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740 - () https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740 - Patch
References () https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382 - () https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382 - Patch
References () https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d - () https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d - Patch
References () https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274 - () https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274 - Patch
References () https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d - () https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d - Patch
References () https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb - () https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux

21 Nov 2024, 07:34

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: usb: ax88179_178a: Reparar accesos fuera de los límites en RX fixup ax88179_rx_fixup() contiene varios accesos fuera de los límites que pueden ser activados por un archivo malicioso (o defectuoso). Dispositivo USB, en particular: - La matriz de metadatos (hdr_off..hdr_off+2*pkt_cnt) puede estar fuera de los límites, provocando lecturas OOB y (en sistemas big-endian) cambios de endianidad OOB. - Un paquete puede superponerse a la matriz de metadatos, lo que provoca un cambio de endianidad OOB posterior que corrompe los datos utilizados por un SKB clonado que ya se ha transferido a la pila de red. - Se puede construir un paquete SKB cuya cola esté mucho más allá de su extremo, lo que hace que los datos del montón fuera de los límites se consideren parte de los datos del SKB. He probado que esto puede ser utilizado por un dispositivo USB malicioso para enviar una solicitud de eco ICMPv6 falsa y recibir una respuesta de eco ICMPv6 en respuesta que contiene datos aleatorios del montón del kernel. Probablemente también sea posible obtener escrituras OOB a partir de esto en un sistema little-endian de alguna manera, tal vez activando skb_cow() a través del procesamiento de opciones de IP, pero no lo he probado.
References () https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930 - () https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930 -
References () https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581 - () https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581 -
References () https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740 - () https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740 -
References () https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382 - () https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382 -
References () https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d - () https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d -
References () https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274 - () https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274 -
References () https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d - () https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d -
References () https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb - () https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb -

16 Jul 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 12:15

Updated : 2025-03-06 12:53


NVD link : CVE-2022-48805

Mitre link : CVE-2022-48805

CVE.ORG link : CVE-2022-48805


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read