CVE-2022-50220

Source
https://cve.org/CVERecord?id=CVE-2022-50220
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50220.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50220
Downstream
Related
Published
2025-06-18T11:03:55.461Z
Modified
2026-03-12T03:26:16.693323Z
Summary
usbnet: Fix linkwatch use-after-free on disconnect
Details

In the Linux kernel, the following vulnerability has been resolved:

usbnet: Fix linkwatch use-after-free on disconnect

usbnet uses the work usbnetdeferredkevent() to perform tasks which may sleep. On disconnect, completion of the work was originally awaited in ->ndo_stop(). But in 2003, that was moved to ->disconnect() by historic commit "[PATCH] USB: usbnet, prevent exotic rtnl deadlock":

https://git.kernel.org/tglx/history/c/0f138bbfd83c

The change was made because back then, the kernel's workqueue implementation did not allow waiting for a single work. One had to wait for completion of all work by calling flushscheduledwork(), and that could deadlock when waiting for usbnetdeferredkevent() with rtnlmutex held in ->ndostop().

The commit solved one problem but created another: It causes a use-after-free in USB Ethernet drivers aqc111.c, asixdevices.c, ax88179178a.c, ch9200.c and smsc75xx.c:

  • If the drivers receive a link change interrupt immediately before disconnect, they raise EVENTLINKRESET in their (non-sleepable) ->status() callback and schedule usbnetdeferredkevent().
  • usbnetdeferredkevent() invokes the driver's ->linkreset() callback, which calls netifcarrier_{on,off}().
  • That in turn schedules the work linkwatch_event().

Because usbnetdeferredkevent() is awaited after unregisternetdev(), netifcarrier_{on,off}() may operate on an unregistered netdev and linkwatchevent() may run after freenetdev(), causing a use-after-free.

In 2010, usbnet was changed to only wait for a single instance of usbnetdeferredkevent() instead of all work by commit 23f333a2bfaf ("drivers/net: don't use flushscheduledwork()").

Unfortunately the commit neglected to move the wait back to ->ndo_stop(). Rectify that omission at long last.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50220.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
23f333a2bfafba80339315b724808982a9de57d9
Fixed
d2d6b530d89b0a912148018027386aa049f0a309
Fixed
e2a521a7dcc463c5017b4426ca0804e151faeff7
Fixed
7f77dcbc030c2faa6d8e8a594985eeb34018409e
Fixed
8b4588b8b00b299be16a35be67b331d8fdba03f3
Fixed
135199a2edd459d2b123144efcd7f9bcd95128e4
Fixed
635fd8953e4309b54ca6a81bed1d4a87668694f4
Fixed
d49bb8cf9bfaa06aa527eb30f1a52a071da2e32f
Fixed
db3b738ae5f726204876f4303c49cfdf4311403f
Fixed
a69e617e533edddf3fa3123149900f36e0a6dc74

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50220.json"