Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-48805— net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup

EPSS 0.01% · P3

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinuxe2ca90c276e1fc410d7cd3c1a4eee245ec902a20< 711b6bf3fb052f0a6b5b3205d50e30c0c2980382affected
e2ca90c276e1fc410d7cd3c1a4eee245ec902a20< 63f0cfb36c1f1964a59ce544156677601e2d8740affected
e2ca90c276e1fc410d7cd3c1a4eee245ec902a20< 1668781ed24da43498799aa4f65714a7de201930affected
e2ca90c276e1fc410d7cd3c1a4eee245ec902a20< a0fd5492ee769029a636f1fb521716b022b1423daffected
e2ca90c276e1fc410d7cd3c1a4eee245ec902a20< 758290defe93a865a2880d10c5d5abd288b64b5daffected
e2ca90c276e1fc410d7cd3c1a4eee245ec902a20< ffd0393adcdcefab7e131488e10dcfde5e02d6ebaffected
e2ca90c276e1fc410d7cd3c1a4eee245ec902a20< 9681823f96a811268265f35307072ad80713c274affected
e2ca90c276e1fc410d7cd3c1a4eee245ec902a20< 57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581affected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-48805

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup ax88179_rx_fixup() contains several out-of-bounds accesses that can be triggered by a malicious (or defective) USB device, in particular: - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds, causing OOB reads and (on big-endian systems) OOB endianness flips. - A packet can overlap the metadata array, causing a later OOB endianness flip to corrupt data used by a cloned SKB that has already been handed off into the network stack. - A packet SKB can be constructed whose tail is far beyond its end, causing out-of-bounds heap data to be considered part of the SKB's data. I have tested that this can be used by a malicious USB device to send a bogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response that contains random kernel heap data. It's probably also possible to get OOB writes from this on a little-endian system somehow - maybe by triggering skb_cow() via IP options processing -, but I haven't tested that.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于net:usb:ax88179_178a模块中发现越界访问问题。ax88179_rx_fixup函数中存在多个越界访问,可能被恶意或有缺陷的USB设备触发。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux e2ca90c276e1fc410d7cd3c1a4eee245ec902a20 ~ 711b6bf3fb052f0a6b5b3205d50e30c0c2980382 -
LinuxLinux 3.9 -

II. Public POCs for CVE-2022-48805

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-48805

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-07-16 · 98 CVEs total

CVE-2022-48832audit: don't deref the syscall args when checking the openat2 open_how::flags
CVE-2022-48826drm/vc4: Fix deadlock on DSI device attach error
CVE-2022-48822usb: f_fs: Fix use-after-free for epfile
CVE-2022-48821misc: fastrpc: avoid double fput() on failed usercopy
CVE-2022-48819tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case
CVE-2022-48820phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()
CVE-2022-48818net: dsa: mv88e6xxx: don't use devres for mdiobus
CVE-2022-48823scsi: qedf: Fix refcount issue when LOGO is received during TMF
CVE-2022-48830can: isotp: fix potential CAN frame reception race in isotp_rcv()
CVE-2022-48831ima: fix reference leak in asymmetric_verify()
CVE-2022-48828NFSD: Fix ia_size underflow
CVE-2022-48834usb: usbtmc: Fix bug in pipe direction for control transfers
CVE-2022-48833btrfs: skip reserved bytes warning on unmount after log cleanup failure
CVE-2022-48835scsi: mpt3sas: Page fault in reply q processing
CVE-2022-48837usb: gadget: rndis: prevent integer overflow in rndis_set_response()
CVE-2022-48836Input: aiptek - properly check endpoint type
CVE-2022-48838usb: gadget: Fix use-after-free bug by not setting udc->dev.driver
CVE-2022-48839net/packet: fix slab-out-of-bounds access in packet_recvmsg()
CVE-2022-48840iavf: Fix hang during reboot/shutdown
CVE-2022-48842ice: Fix race condition during interface enslave

Showing top 20 of 98 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2022-48805

No comments yet


Leave a comment