๐Ÿ” CVE Alert

CVE-2022-49398

UNKNOWN 0.0

usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback The list_for_each_entry_safe() macro saves the current item (n) and the item after (n+1), so that n can be safely removed without corrupting the list. However, when traversing the list and removing items using gadget giveback, the DWC3 lock is briefly released, allowing other routines to execute. There is a situation where, while items are being removed from the cancelled_list using dwc3_gadget_ep_cleanup_cancelled_requests(), the pullup disable routine is running in parallel (due to UDC unbind). As the cleanup routine removes n, and the pullup disable removes n+1, once the cleanup retakes the DWC3 lock, it references a request who was already removed/handled. With list debug enabled, this leads to a panic. Ensure all instances of the macro are replaced where gadget giveback is used. Example call stack: Thread#1: __dwc3_gadget_ep_set_halt() - CLEAR HALT -> dwc3_gadget_ep_cleanup_cancelled_requests() ->list_for_each_entry_safe() ->dwc3_gadget_giveback(n) ->dwc3_gadget_del_and_unmap_request()- n deleted[cancelled_list] ->spin_unlock ->Thread#2 executes ... ->dwc3_gadget_giveback(n+1) ->Already removed! Thread#2: dwc3_gadget_pullup() ->waiting for dwc3 spin_lock ... ->Thread#1 released lock ->dwc3_stop_active_transfers() ->dwc3_remove_requests() ->fetches n+1 item from cancelled_list (n removed by Thread#1) ->dwc3_gadget_giveback() ->dwc3_gadget_del_and_unmap_request()- n+1 deleted[cancelled_list] ->spin_unlock

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d4f1afe5e896c18ae01099a85dab5e1a198bd2a8 < 1c6e5dc3b639c96e6839a8d1b8e951923fdfd34a d4f1afe5e896c18ae01099a85dab5e1a198bd2a8 < 2424307cdf421ac72075a1384eae4e4199ab6457 d4f1afe5e896c18ae01099a85dab5e1a198bd2a8 < 26a7e6832afe9d9a991cfd9015177f083cf959cc d4f1afe5e896c18ae01099a85dab5e1a198bd2a8 < bf594d1d0c1d7b895954018043536ffd327844f9 d7ff2e3ff0e09d57b43014fe26b13bb3c9677254
Linux / Linux
5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/1c6e5dc3b639c96e6839a8d1b8e951923fdfd34a git.kernel.org: https://git.kernel.org/stable/c/2424307cdf421ac72075a1384eae4e4199ab6457 git.kernel.org: https://git.kernel.org/stable/c/26a7e6832afe9d9a991cfd9015177f083cf959cc git.kernel.org: https://git.kernel.org/stable/c/bf594d1d0c1d7b895954018043536ffd327844f9