CVE-2022-48760

Source
https://cve.org/CVERecord?id=CVE-2022-48760
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48760.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48760
Downstream
Related
Published
2024-06-20T11:13:38.532Z
Modified
2026-03-14T11:56:19.164058Z
Summary
USB: core: Fix hang in usb_kill_urb by adding memory barriers
Details

In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix hang in usbkillurb by adding memory barriers

The syzbot fuzzer has identified a bug in which processes hang waiting for usbkillurb() to return. It turns out the issue is not unlinking the URB; that works just fine. Rather, the problem arises when the wakeup notification that the URB has completed is not received.

The reason is memory-access ordering on SMP systems. In outline form, usbkillurb() and _usbhcdgivebackurb() operating concurrently on different CPUs perform the following actions:

CPU 0 CPU 1 ---------------------------- --------------------------------- usbkillurb(): _usbhcdgivebackurb(): ... ... atomicinc(&urb->reject); atomicdec(&urb->usecount); ... ... waitevent(usbkillurbqueue, atomicread(&urb->usecount) == 0); if (atomicread(&urb->reject)) wakeup(&usbkillurbqueue);

Confining your attention to urb->reject and urb->use_count, you can see that the overall pattern of accesses on CPU 0 is:

write urb->reject, then read urb->use_count;

whereas the overall pattern of accesses on CPU 1 is:

write urb->use_count, then read urb->reject.

This pattern is referred to in memory-model circles as SB (for "Store Buffering"), and it is well known that without suitable enforcement of the desired order of accesses -- in the form of memory barriers -- it is entirely possible for one or both CPUs to execute their reads ahead of their writes. The end result will be that sometimes CPU 0 sees the old un-decremented value of urb->usecount while CPU 1 sees the old un-incremented value of urb->reject. Consequently CPU 0 ends up on the wait queue and never gets woken up, leading to the observed hang in usbkill_urb().

The same pattern of accesses occurs in usbpoisonurb() and the failure pathway of usbhcdsubmit_urb().

The problem is fixed by adding suitable memory barriers. To provide proper memory-access ordering in the SB pattern, a full barrier is required on both CPUs. The atomicinc() and atomicdec() accesses themselves don't provide any memory ordering, but since they are present, we can use the optimized smpmbafteratomic() memory barrier in the various routines to obtain the desired effect.

This patch adds the necessary memory barriers.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48760.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
49367d8f1d9f26482cf7089489e90f0afd0a942c
Fixed
5f138ef224dffd15d5e5c5b095859719e0038427
Fixed
b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0
Fixed
546ba238535d925254e0b3f12012a5c55801e2f3
Fixed
5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b
Fixed
9c61fce322ac2ef7fecf025285353570d60e41d6
Fixed
e3b131e30e612ff0e32de6c1cb4f69f89db29193
Fixed
9340226388c66a7e090ebb00e91ed64a753b6c26
Fixed
c9a18f7c5b071dce5e6939568829d40994866ab0
Fixed
26fbe9772b8c459687930511444ce443011f86bf

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48760.json"