In the Linux kernel, the following vulnerability has been resolved:
gadgetfs: ep_io - wait until IRQ finishes
after usb_ep_queue() if wait_for_completion_interruptible() is
interrupted we need to wait until IRQ gets finished.
Otherwise complete() from epio_complete() can corrupt stack.
References
Configurations
Configuration 1 (hide)
|
History
13 Nov 2025, 19:30
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux linux Kernel
Linux |
|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/04cb742d4d8f30dc2e83b46ac317eec09191c68e - Patch | |
| References | () https://git.kernel.org/stable/c/118d967ce00a3d128bf731b35e4e2cb0facf5f00 - Patch | |
| References | () https://git.kernel.org/stable/c/2b06d5d97c0e067108a122986767731d40742138 - Patch | |
| References | () https://git.kernel.org/stable/c/67a4874461422e633236a0286a01b483cd647113 - Patch | |
| References | () https://git.kernel.org/stable/c/77040efe59a141286d090c8a0d37c65a355a1832 - Patch | |
| References | () https://git.kernel.org/stable/c/94aadba8d000d5de56af4ce8da3f334f21bf7a79 - Patch | |
| References | () https://git.kernel.org/stable/c/9ac14f973cb91f0c01776517e6d50981f32b8038 - Patch | |
| References | () https://git.kernel.org/stable/c/ca06b4cde54f8ec8be3aa53fd339bd56e62c12b3 - Patch |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-13 19:30
NVD link : CVE-2022-50028
Mitre link : CVE-2022-50028
CVE.ORG link : CVE-2022-50028
JSON object : View
Products Affected
linux
- linux_kernel
CWE
