Linux Kernel up to 5.16.2 dwc3-qcom.c dwc3_qcom_probe dwc3_qcom_create_urs_usb_platdev return value
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.4 | $0-$5k | 0.00 |
A vulnerability has been found in Linux Kernel up to 5.16.2 (Operating System) and classified as problematic. This vulnerability affects the function dwc3_qcom_probe
of the file drivers/usb/dwc3/dwc3-qcom.c. The manipulation of the argument dwc3_qcom_create_urs_usb_platdev
with an unknown input leads to a return value vulnerability. The CWE definition for the vulnerability is CWE-252. The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions. The impact remains unknown. CVE summarizes:
In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
The weakness was released 03/01/2023 as b52fe2dbb3e655eb1483000adfab68a219549e13. The advisory is shared for download at github.com. This vulnerability was named CVE-2023-22999 since 01/11/2023. There are known technical details, but no exploit is available.
Upgrading to version 5.16.3 eliminates this vulnerability. The upgrade is hosted for download at cdn.kernel.org. Applying the patch b52fe2dbb3e655eb1483000adfab68a219549e13 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 5.4
VulDB Base Score: 5.5
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 5.5
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Return valueCWE: CWE-252 / CWE-253
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Kernel 5.16.3
Patch: b52fe2dbb3e655eb1483000adfab68a219549e13
Timeline
01/11/2023 🔍03/01/2023 🔍
03/01/2023 🔍
03/26/2023 🔍
Sources
Vendor: kernel.orgAdvisory: b52fe2dbb3e655eb1483000adfab68a219549e13
Status: Confirmed
CVE: CVE-2023-22999 (🔍)
Entry
Created: 03/01/2023 07:04Updated: 03/26/2023 13:57
Changes: 03/01/2023 07:04 (46), 03/26/2023 13:57 (10)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.