In the Linux kernel, the following vulnerability has been resolved:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
ax88179_rx_fixup() contains several out-of-bounds accesses that can be
triggered by a malicious (or defective) USB device, in particular:
- The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,
causing OOB reads and (on big-endian systems) OOB endianness flips.
- A packet can overlap the metadata array, causing a later OOB
endianness flip to corrupt data used by a cloned SKB that has already
been handed off into the network stack.
- A packet SKB can be constructed whose tail is far beyond its end,
causing out-of-bounds heap data to be considered part of the SKB's
data.
I have tested that this can be used by a malicious USB device to send a
bogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response
that contains random kernel heap data.
It's probably also possible to get OOB writes from this on a
little-endian system somehow - maybe by triggering skb_cow() via IP
options processing -, but I haven't tested that.
References
Configurations
Configuration 1 (hide)
|
History
06 Mar 2025, 12:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:* |
|
CWE | CWE-125 | |
References | () https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930 - Patch | |
References | () https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581 - Patch | |
References | () https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740 - Patch | |
References | () https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382 - Patch | |
References | () https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d - Patch | |
References | () https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274 - Patch | |
References | () https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d - Patch | |
References | () https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930 - | |
References | () https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581 - | |
References | () https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740 - | |
References | () https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382 - | |
References | () https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d - | |
References | () https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274 - | |
References | () https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d - | |
References | () https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb - |
16 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-16 12:15
Updated : 2025-03-06 12:53
NVD link : CVE-2022-48805
Mitre link : CVE-2022-48805
CVE.ORG link : CVE-2022-48805
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read