Executive Summary

Informations
Name CVE-2022-49326 First vendor Publication 2025-02-26
Vendor Cve Last vendor Modification 2025-03-13

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

rtl818x: Prevent using not initialized queues

Using not existing queues can panic the kernel with rtl8180/rtl8185 cards. Ignore the skb priority for those cards, they only have one tx queue. Pierre Asselin (pa@panix.com) reported the kernel crash in the Gentoo forum:

https://forums.gentoo.org/viewtopic-t-1147832-postdays-0-postorder-asc-start-25.html

He also confirmed that this patch fixes the issue. In summary this happened:

After updating wpa_supplicant from 2.9 to 2.10 the kernel crashed with a "divide error: 0000" when connecting to an AP. Control port tx now tries to use IEEE80211_AC_VO for the priority, which wpa_supplicants starts to use in 2.10.

Since only the rtl8187se part of the driver supports QoS, the priority of the skb is set to IEEE80211_AC_BE (2) by mac80211 for rtl8180/rtl8185 cards.

rtl8180 is then unconditionally reading out the priority and finally crashes on drivers/net/wireless/realtek/rtl818x/rtl8180/dev.c line 544 without this patch:
idx = (ring->idx + skb_queue_len(&ring->queue)) % ring->entries

"ring->entries" is zero for rtl8180/rtl8185 cards, tx_ring[2] never got initialized.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49326

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3538

Sources (Detail)

https://git.kernel.org/stable/c/6ad81ad0cf5744738ce94c8e64051ddd80a1734c
https://git.kernel.org/stable/c/746285cf81dc19502ab238249d75f5990bd2d231
https://git.kernel.org/stable/c/769ec2a824deae2f1268dfda14999a4d14d0d0c5
https://git.kernel.org/stable/c/98e55b0b876bde3353f4e074883d66ecb55c65a3
https://git.kernel.org/stable/c/9ad1981fc4de3afb7db3e8eb5a6a52d4c7d0d577
https://git.kernel.org/stable/c/9d5e96cc1f1720019ce27b127a31695148d38bb0
https://git.kernel.org/stable/c/b5dca2cd3f0239512da808598b4e70557eb4c2a1
https://git.kernel.org/stable/c/b8ce58ab80faaea015c206382041ff3bcf5495ff
https://git.kernel.org/stable/c/d7e30dfc166d33470bba31a42f9bbc346e5409d5
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2025-06-26 02:09:33
  • Multiple Updates
2025-06-25 12:22:24
  • Multiple Updates
2025-06-24 02:14:09
  • Multiple Updates
2025-05-27 02:10:15
  • Multiple Updates
2025-03-29 03:14:33
  • Multiple Updates
2025-03-28 13:34:53
  • Multiple Updates
2025-03-28 02:56:58
  • Multiple Updates
2025-03-19 00:21:07
  • Multiple Updates
2025-03-18 00:21:10
  • Multiple Updates
2025-03-14 00:21:37
  • Multiple Updates
2025-02-26 17:20:32
  • First insertion