Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: An Echo In Here in here

      September 19, 2025

      How To Minimize The Environmental Impact Of Your Website

      September 19, 2025

      Progress adds AI coding assistance to Telerik and Kendo UI libraries

      September 19, 2025

      Wasm 3.0 standard is now officially complete

      September 19, 2025

      Development Release: Ubuntu 25.10 Beta

      September 18, 2025

      Development Release: Linux Mint 7 Beta “LMDE”

      September 18, 2025

      Distribution Release: Tails 7.0

      September 18, 2025

      Distribution Release: Security Onion 2.4.180

      September 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      GenStudio for Performance Marketing: What’s New and What We’ve Learned

      September 19, 2025
      Recent

      GenStudio for Performance Marketing: What’s New and What We’ve Learned

      September 19, 2025

      Agentic and Generative Commerce Can Elevate CX in B2B

      September 19, 2025

      AI Momentum and Perficient’s Inclusion in Analyst Reports – Highlights From 2025 So Far

      September 18, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Denmark’s Strategic Leap Replacing Microsoft Office 365 with LibreOffice for Digital Independence

      September 19, 2025
      Recent

      Denmark’s Strategic Leap Replacing Microsoft Office 365 with LibreOffice for Digital Independence

      September 19, 2025

      Development Release: Ubuntu 25.10 Beta

      September 18, 2025

      Development Release: Linux Mint 7 Beta “LMDE”

      September 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2022-50220 – Linux USBnet Use-After-Free Vulnerability

    CVE-2022-50220 – Linux USBnet Use-After-Free Vulnerability

    June 18, 2025

    CVE ID : CVE-2022-50220

    Published : June 18, 2025, 11:15 a.m. | 3 hours, 16 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    usbnet: Fix linkwatch use-after-free on disconnect

    usbnet uses the work usbnet_deferred_kevent() to perform tasks which may
    sleep. On disconnect, completion of the work was originally awaited in
    ->ndo_stop(). But in 2003, that was moved to ->disconnect() by historic
    commit “[PATCH] USB: usbnet, prevent exotic rtnl deadlock”:

    https://git.kernel.org/tglx/history/c/0f138bbfd83c

    The change was made because back then, the kernel’s workqueue
    implementation did not allow waiting for a single work. One had to wait
    for completion of *all* work by calling flush_scheduled_work(), and that
    could deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex
    held in ->ndo_stop().

    The commit solved one problem but created another: It causes a
    use-after-free in USB Ethernet drivers aqc111.c, asix_devices.c,
    ax88179_178a.c, ch9200.c and smsc75xx.c:

    * If the drivers receive a link change interrupt immediately before
    disconnect, they raise EVENT_LINK_RESET in their (non-sleepable)
    ->status() callback and schedule usbnet_deferred_kevent().
    * usbnet_deferred_kevent() invokes the driver’s ->link_reset() callback,
    which calls netif_carrier_{on,off}().
    * That in turn schedules the work linkwatch_event().

    Because usbnet_deferred_kevent() is awaited after unregister_netdev(),
    netif_carrier_{on,off}() may operate on an unregistered netdev and
    linkwatch_event() may run after free_netdev(), causing a use-after-free.

    In 2010, usbnet was changed to only wait for a single instance of
    usbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf
    (“drivers/net: don’t use flush_scheduled_work()”).

    Unfortunately the commit neglected to move the wait back to
    ->ndo_stop(). Rectify that omission at long last.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2022-50227 – “KVM Xen Timer Initialization Vulnerability”
    Next Article CVE-2022-50218 – Linux Kernel IIO Light Driver Null Pointer Dereference Vulnerability

    Related Posts

    Development

    Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

    September 14, 2025
    Development

    Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

    September 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Well done, EA — what may be Battlefield 2042’s final update made me more excited than ever for Battlefield 6

    News & Updates

    Developer Spotlight: MisterPrada

    News & Updates

    Building personal apps with open source and AI

    News & Updates

    Critical Viasat Firmware Vulnerability Let Attackers Execute Remote Code

    Security

    Highlights

    CVE-2025-9357 – “Linksys Wi-Fi Router Stack-Based Buffer Overflow Vulnerability”

    August 23, 2025

    CVE ID : CVE-2025-9357

    Published : Aug. 23, 2025, 6:15 a.m. | 18 hours, 54 minutes ago

    Description : A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function langSwitchByBBS of the file /goform/langSwitchByBBS. The manipulation of the argument langSelectionOnly leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

    Severity: 9.0 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Windows 11 will soon be able to describe images on your screen using AI — and it’ll all be done locally

    July 15, 2025

    China Linked Houken Hackers Breach French Systems with Ivanti Zero Days

    July 3, 2025

    Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 17/2025

    April 27, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.