CVE-2022-25375

An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:52

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/02/21/1 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/02/21/1 - Mailing List, Patch, Third Party Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 - Patch, Release Notes, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 - Patch, Release Notes, Vendor Advisory
References () https://github.com/szymonh/rndis-co - Third Party Advisory () https://github.com/szymonh/rndis-co - Third Party Advisory
References () https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - Mailing List, Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5092 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5092 - Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5096 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5096 - Third Party Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-668 CWE-1284

Information

Published : 2022-02-20 20:15

Updated : 2024-11-21 06:52


NVD link : CVE-2022-25375

Mitre link : CVE-2022-25375

CVE.ORG link : CVE-2022-25375


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-1284

Improper Validation of Specified Quantity in Input