In the Linux kernel, the following vulnerability has been resolved:
gadgetfs: ep_io - wait until IRQ finishes
after usbepqueue() if waitforcompletion_interruptible() is interrupted we need to wait until IRQ gets finished.
Otherwise complete() from epio_complete() can corrupt stack.
{ "vanir_signatures": [ { "id": "CVE-2022-50028-043bbe9b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ca06b4cde54f8ec8be3aa53fd339bd56e62c12b3", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 1045.0, "function_hash": "123643533830042357824936716710927903488" }, "target": { "file": "drivers/usb/gadget/legacy/inode.c", "function": "ep_io" } }, { "id": "CVE-2022-50028-08917a99", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2b06d5d97c0e067108a122986767731d40742138", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 1007.0, "function_hash": "141550744137618888664976316591806885386" }, "target": { "file": "drivers/usb/gadget/legacy/inode.c", "function": "ep_io" } }, { "id": "CVE-2022-50028-1606923b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04cb742d4d8f30dc2e83b46ac317eec09191c68e", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 1007.0, "function_hash": "141550744137618888664976316591806885386" }, "target": { "file": "drivers/usb/gadget/legacy/inode.c", "function": "ep_io" } }, { "id": "CVE-2022-50028-34dd5eb5", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@67a4874461422e633236a0286a01b483cd647113", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "119312672243594522272606509891816176121", "14507501190505133861478494257260883734", "236051123216009421989748031688394560264", "297337349933111543194031602818890009633" ] }, "target": { "file": "drivers/usb/gadget/legacy/inode.c" } }, { "id": "CVE-2022-50028-4870fc38", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@118d967ce00a3d128bf731b35e4e2cb0facf5f00", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 1045.0, "function_hash": "123643533830042357824936716710927903488" }, "target": { "file": "drivers/usb/gadget/legacy/inode.c", "function": "ep_io" } }, { "id": "CVE-2022-50028-558bda50", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2b06d5d97c0e067108a122986767731d40742138", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "119312672243594522272606509891816176121", "14507501190505133861478494257260883734", "236051123216009421989748031688394560264", "297337349933111543194031602818890009633" ] }, "target": { "file": "drivers/usb/gadget/legacy/inode.c" } }, { "id": "CVE-2022-50028-5668b317", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@118d967ce00a3d128bf731b35e4e2cb0facf5f00", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "119312672243594522272606509891816176121", "14507501190505133861478494257260883734", "236051123216009421989748031688394560264", "297337349933111543194031602818890009633" ] }, "target": { "file": "drivers/usb/gadget/legacy/inode.c" } }, { "id": "CVE-2022-50028-5c408cb9", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94aadba8d000d5de56af4ce8da3f334f21bf7a79", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "119312672243594522272606509891816176121", "14507501190505133861478494257260883734", "236051123216009421989748031688394560264", "297337349933111543194031602818890009633" ] }, "target": { "file": "drivers/usb/gadget/legacy/inode.c" } }, { "id": "CVE-2022-50028-7ba4d598", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9ac14f973cb91f0c01776517e6d50981f32b8038", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "119312672243594522272606509891816176121", "14507501190505133861478494257260883734", "236051123216009421989748031688394560264", "297337349933111543194031602818890009633" ] }, "target": { "file": "drivers/usb/gadget/legacy/inode.c" } }, { "id": "CVE-2022-50028-aea8f78c", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94aadba8d000d5de56af4ce8da3f334f21bf7a79", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 1007.0, "function_hash": "141550744137618888664976316591806885386" }, "target": { "file": "drivers/usb/gadget/legacy/inode.c", "function": "ep_io" } }, { "id": "CVE-2022-50028-bc815f01", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ca06b4cde54f8ec8be3aa53fd339bd56e62c12b3", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "119312672243594522272606509891816176121", "14507501190505133861478494257260883734", "236051123216009421989748031688394560264", "297337349933111543194031602818890009633" ] }, "target": { "file": "drivers/usb/gadget/legacy/inode.c" } }, { "id": "CVE-2022-50028-c67ee909", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@67a4874461422e633236a0286a01b483cd647113", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 1045.0, "function_hash": "123643533830042357824936716710927903488" }, "target": { "file": "drivers/usb/gadget/legacy/inode.c", "function": "ep_io" } }, { "id": "CVE-2022-50028-cb6e0000", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@77040efe59a141286d090c8a0d37c65a355a1832", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 1045.0, "function_hash": "123643533830042357824936716710927903488" }, "target": { "file": "drivers/usb/gadget/legacy/inode.c", "function": "ep_io" } }, { "id": "CVE-2022-50028-e8161576", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@77040efe59a141286d090c8a0d37c65a355a1832", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "119312672243594522272606509891816176121", "14507501190505133861478494257260883734", "236051123216009421989748031688394560264", "297337349933111543194031602818890009633" ] }, "target": { "file": "drivers/usb/gadget/legacy/inode.c" } }, { "id": "CVE-2022-50028-e8a57f33", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04cb742d4d8f30dc2e83b46ac317eec09191c68e", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "119312672243594522272606509891816176121", "14507501190505133861478494257260883734", "236051123216009421989748031688394560264", "297337349933111543194031602818890009633" ] }, "target": { "file": "drivers/usb/gadget/legacy/inode.c" } }, { "id": "CVE-2022-50028-fa56eaef", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9ac14f973cb91f0c01776517e6d50981f32b8038", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 1007.0, "function_hash": "141550744137618888664976316591806885386" }, "target": { "file": "drivers/usb/gadget/legacy/inode.c", "function": "ep_io" } } ] }