cve-2022-48761
Vulnerability from cvelistv5
Published
2024-06-20 11:13
Modified
2024-08-03 15:25
Severity ?
Summary
usb: xhci-plat: fix crash when suspend if remote wake enable
Impacted products
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-48761",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-20T13:34:36.950098Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-20T13:34:48.820Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:25:01.055Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d5755832a1e47f5d8773f0776e211ecd4e02da72"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/8b05ad29acb972850ad795fa850e814b2e758b83"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9df478463d9feb90dae24f183383961cf123a0ec"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/host/xhci-plat.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "20c51a4c5220",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            },
            {
              "lessThan": "d5755832a1e4",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            },
            {
              "lessThan": "8b05ad29acb9",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            },
            {
              "lessThan": "9df478463d9f",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/host/xhci-plat.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.96",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.19",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "5.16.*",
              "status": "unaffected",
              "version": "5.16.5",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.17",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci-plat: fix crash when suspend if remote wake enable\n\nCrashed at i.mx8qm platform when suspend if enable remote wakeup\n\nInternal error: synchronous external abort: 96000210 [#1] PREEMPT SMP\nModules linked in:\nCPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12\nHardware name: Freescale i.MX8QM MEK (DT)\nWorkqueue: events_unbound async_run_entry_fn\npstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : xhci_disable_hub_port_wake.isra.62+0x60/0xf8\nlr : xhci_disable_hub_port_wake.isra.62+0x34/0xf8\nsp : ffff80001394bbf0\nx29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578\nx26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000\nx23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001\nx20: 0000000000000000 x19: ffff800014e90490 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0\nx8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453\nx5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff00081193a29c\nx2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff000814591620\nCall trace:\n xhci_disable_hub_port_wake.isra.62+0x60/0xf8\n xhci_suspend+0x58/0x510\n xhci_plat_suspend+0x50/0x78\n platform_pm_suspend+0x2c/0x78\n dpm_run_callback.isra.25+0x50/0xe8\n __device_suspend+0x108/0x3c0\n\nThe basic flow:\n\t1. run time suspend call xhci_suspend, xhci parent devices gate the clock.\n        2. echo mem \u003e/sys/power/state, system _device_suspend call xhci_suspend\n        3. xhci_suspend call xhci_disable_hub_port_wake, which access register,\n\t   but clock already gated by run time suspend.\n\nThis problem was hidden by power domain driver, which call run time resume before it.\n\nBut the below commit remove it and make this issue happen.\n\tcommit c1df456d0f06e (\"PM: domains: Don\u0027t runtime resume devices at genpd_prepare()\")\n\nThis patch call run time resume before suspend to make sure clock is on\nbefore access register.\n\nTesteb-by: Abel Vesa \u003cabel.vesa@nxp.com\u003e"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-20T11:14:55.523Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5"
        },
        {
          "url": "https://git.kernel.org/stable/c/d5755832a1e47f5d8773f0776e211ecd4e02da72"
        },
        {
          "url": "https://git.kernel.org/stable/c/8b05ad29acb972850ad795fa850e814b2e758b83"
        },
        {
          "url": "https://git.kernel.org/stable/c/9df478463d9feb90dae24f183383961cf123a0ec"
        }
      ],
      "title": "usb: xhci-plat: fix crash when suspend if remote wake enable",
      "x_generator": {
        "engine": "bippy-7d53e8ef8be4"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-48761",
    "datePublished": "2024-06-20T11:13:39.194Z",
    "dateReserved": "2024-06-20T11:09:39.060Z",
    "dateUpdated": "2024-08-03T15:25:01.055Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-48761\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-06-20T12:15:14.203\",\"lastModified\":\"2024-06-20T12:43:25.663\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: xhci-plat: fix crash when suspend if remote wake enable\\n\\nCrashed at i.mx8qm platform when suspend if enable remote wakeup\\n\\nInternal error: synchronous external abort: 96000210 [#1] PREEMPT SMP\\nModules linked in:\\nCPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12\\nHardware name: Freescale i.MX8QM MEK (DT)\\nWorkqueue: events_unbound async_run_entry_fn\\npstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\npc : xhci_disable_hub_port_wake.isra.62+0x60/0xf8\\nlr : xhci_disable_hub_port_wake.isra.62+0x34/0xf8\\nsp : ffff80001394bbf0\\nx29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578\\nx26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000\\nx23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001\\nx20: 0000000000000000 x19: ffff800014e90490 x18: 0000000000000000\\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\\nx14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000\\nx11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0\\nx8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453\\nx5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff00081193a29c\\nx2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff000814591620\\nCall trace:\\n xhci_disable_hub_port_wake.isra.62+0x60/0xf8\\n xhci_suspend+0x58/0x510\\n xhci_plat_suspend+0x50/0x78\\n platform_pm_suspend+0x2c/0x78\\n dpm_run_callback.isra.25+0x50/0xe8\\n __device_suspend+0x108/0x3c0\\n\\nThe basic flow:\\n\\t1. run time suspend call xhci_suspend, xhci parent devices gate the clock.\\n        2. echo mem \u003e/sys/power/state, system _device_suspend call xhci_suspend\\n        3. xhci_suspend call xhci_disable_hub_port_wake, which access register,\\n\\t   but clock already gated by run time suspend.\\n\\nThis problem was hidden by power domain driver, which call run time resume before it.\\n\\nBut the below commit remove it and make this issue happen.\\n\\tcommit c1df456d0f06e (\\\"PM: domains: Don\u0027t runtime resume devices at genpd_prepare()\\\")\\n\\nThis patch call run time resume before suspend to make sure clock is on\\nbefore access register.\\n\\nTesteb-by: Abel Vesa \u003cabel.vesa@nxp.com\u003e\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8b05ad29acb972850ad795fa850e814b2e758b83\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9df478463d9feb90dae24f183383961cf123a0ec\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d5755832a1e47f5d8773f0776e211ecd4e02da72\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...