{"id":"CVE-2022-48926","summary":"usb: gadget: rndis: add spinlock for rndis response list","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: rndis: add spinlock for rndis response list\n\nThere's no lock for rndis response list. It could cause list corruption\nif there're two different list_add at the same time like below.\nIt's better to add in rndis_add_response / rndis_free_response\n/ rndis_get_next_response to prevent any race condition on response list.\n\n[  361.894299] [1:   irq/191-dwc3:16979] list_add corruption.\nnext-\u003eprev should be prev (ffffff80651764d0),\nbut was ffffff883dc36f80. (next=ffffff80651764d0).\n\n[  361.904380] [1:   irq/191-dwc3:16979] Call trace:\n[  361.904391] [1:   irq/191-dwc3:16979]  __list_add_valid+0x74/0x90\n[  361.904401] [1:   irq/191-dwc3:16979]  rndis_msg_parser+0x168/0x8c0\n[  361.904409] [1:   irq/191-dwc3:16979]  rndis_command_complete+0x24/0x84\n[  361.904417] [1:   irq/191-dwc3:16979]  usb_gadget_giveback_request+0x20/0xe4\n[  361.904426] [1:   irq/191-dwc3:16979]  dwc3_gadget_giveback+0x44/0x60\n[  361.904434] [1:   irq/191-dwc3:16979]  dwc3_ep0_complete_data+0x1e8/0x3a0\n[  361.904442] [1:   irq/191-dwc3:16979]  dwc3_ep0_interrupt+0x29c/0x3dc\n[  361.904450] [1:   irq/191-dwc3:16979]  dwc3_process_event_entry+0x78/0x6cc\n[  361.904457] [1:   irq/191-dwc3:16979]  dwc3_process_event_buf+0xa0/0x1ec\n[  361.904465] [1:   irq/191-dwc3:16979]  dwc3_thread_interrupt+0x34/0x5c","modified":"2026-03-20T12:22:00.887002Z","published":"2024-08-22T03:31:18.572Z","related":["SUSE-SU-2024:3190-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3225-1","SUSE-SU-2024:3227-1","SUSE-SU-2024:3249-1","SUSE-SU-2024:3408-1","SUSE-SU-2024:3483-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48926.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/33222d1571d7ce8c1c75f6b488f38968fa93d2d9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4ce247af3f30078d5b97554f1ae6200a0222c15a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/669c2b178956718407af5631ccbc61c24413f038"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9ab652d41deab49848673c3dadb57ad338485376"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9f5d8ba538ef81cd86ea587ca3f8c77e26bea405"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9f688aadede6b862a0a898792b1a35421c93636f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aaaba1c86d04dac8e49bf508b492f81506257da3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/da514063440b53a27309a4528b726f92c3cfe56f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48926.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48926"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f6281af9d62e128aa6efad29cf7265062af114f2"},{"fixed":"9f5d8ba538ef81cd86ea587ca3f8c77e26bea405"},{"fixed":"669c2b178956718407af5631ccbc61c24413f038"},{"fixed":"9f688aadede6b862a0a898792b1a35421c93636f"},{"fixed":"9ab652d41deab49848673c3dadb57ad338485376"},{"fixed":"4ce247af3f30078d5b97554f1ae6200a0222c15a"},{"fixed":"da514063440b53a27309a4528b726f92c3cfe56f"},{"fixed":"33222d1571d7ce8c1c75f6b488f38968fa93d2d9"},{"fixed":"aaaba1c86d04dac8e49bf508b492f81506257da3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48926.json"}}],"schema_version":"1.7.5"}