CVE-2022-49936
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's USB core where nested device-reset calls can occur. Specifically, during the unbinding of the rtl8712 USB driver from a composite device, a usb_reset_device() call is made inside another reset call, causing a recursive locking violation. The USB core lacked protection against such nested resets, which can lead to deadlocks or other stability issues. The fix involved adding a reset_in_progress flag to prevent nested resets.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to encounter recursive locking violations during USB device resets, potentially leading to deadlocks or system instability. This may affect the reliability of USB device handling, possibly causing device malfunctions or system crashes when USB devices are reset or disconnected.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for warnings about recursive locking related to USB device resets. Specifically, look for messages similar to "WARNING: possible recursive locking detected" involving usb-storage and usb_reset_device calls. You can use commands like 'dmesg | grep -i usb' or 'journalctl -k | grep -i usb' to check for such warnings in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by adding a reset_in_progress flag to prevent nested device-reset calls. Avoid performing USB device resets during disconnect processing in custom drivers until the kernel is updated.