CVE-2022-48836

In the Linux kernel, the following vulnerability has been resolved: Input: aiptek - properly check endpoint type Syzbot reported warning in usb_submit_urb() which is caused by wrong endpoint type. There was a check for the number of endpoints, but not for the type of endpoint. Fix it by replacing old desc.bNumEndpoints check with usb_find_common_endpoints() helper for finding endpoints Fail log: usb 5-1: BOGUS urb xfer, pipe 1 != type 3 WARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 Modules linked in: CPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 Workqueue: usb_hub_wq hub_event ... Call Trace: <TASK> aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830 input_open_device+0x1bb/0x320 drivers/input/input.c:629 kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7 - Patch () https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7 - Patch
References () https://git.kernel.org/stable/c/5600f6986628dde8881734090588474f54a540a8 - Patch () https://git.kernel.org/stable/c/5600f6986628dde8881734090588474f54a540a8 - Patch
References () https://git.kernel.org/stable/c/57277a8b5d881e02051ba9d7f6cb3f915c229821 - Patch () https://git.kernel.org/stable/c/57277a8b5d881e02051ba9d7f6cb3f915c229821 - Patch
References () https://git.kernel.org/stable/c/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f - Patch () https://git.kernel.org/stable/c/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f - Patch
References () https://git.kernel.org/stable/c/e732b0412f8c603d1e998f3bff41b5e7d5c3914c - Patch () https://git.kernel.org/stable/c/e732b0412f8c603d1e998f3bff41b5e7d5c3914c - Patch
References () https://git.kernel.org/stable/c/e762f57ff255af28236cd02ca9fc5c7e5a089d31 - Patch () https://git.kernel.org/stable/c/e762f57ff255af28236cd02ca9fc5c7e5a089d31 - Patch
References () https://git.kernel.org/stable/c/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a - Patch () https://git.kernel.org/stable/c/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a - Patch
References () https://git.kernel.org/stable/c/fc8033a55e2796d21e370260a784ac9fbb8305a6 - Patch () https://git.kernel.org/stable/c/fc8033a55e2796d21e370260a784ac9fbb8305a6 - Patch

24 Jul 2024, 18:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7 - () https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7 - Patch
References () https://git.kernel.org/stable/c/5600f6986628dde8881734090588474f54a540a8 - () https://git.kernel.org/stable/c/5600f6986628dde8881734090588474f54a540a8 - Patch
References () https://git.kernel.org/stable/c/57277a8b5d881e02051ba9d7f6cb3f915c229821 - () https://git.kernel.org/stable/c/57277a8b5d881e02051ba9d7f6cb3f915c229821 - Patch
References () https://git.kernel.org/stable/c/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f - () https://git.kernel.org/stable/c/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f - Patch
References () https://git.kernel.org/stable/c/e732b0412f8c603d1e998f3bff41b5e7d5c3914c - () https://git.kernel.org/stable/c/e732b0412f8c603d1e998f3bff41b5e7d5c3914c - Patch
References () https://git.kernel.org/stable/c/e762f57ff255af28236cd02ca9fc5c7e5a089d31 - () https://git.kernel.org/stable/c/e762f57ff255af28236cd02ca9fc5c7e5a089d31 - Patch
References () https://git.kernel.org/stable/c/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a - () https://git.kernel.org/stable/c/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a - Patch
References () https://git.kernel.org/stable/c/fc8033a55e2796d21e370260a784ac9fbb8305a6 - () https://git.kernel.org/stable/c/fc8033a55e2796d21e370260a784ac9fbb8305a6 - Patch
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: Entrada: aiptek: verifique correctamente el tipo de endpoint Syzbot informó una advertencia en usb_submit_urb() que se debe a un tipo de endpoint incorrecto. Se verificó la cantidad de endpoints, pero no el tipo de endpoint. Solucionarlo reemplazando la antigua comprobación desc.bNumEndpoints con el asistente usb_find_common_endpoints() para encontrar endpoints Registro de errores: usb 5-1: BOGUS urb xfer, tubería 1! = tipo 3 ADVERTENCIA: CPU: 2 PID: 48 en drivers/usb/core/ urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 Módulos vinculados en: CPU: 2 PID: 48 Comm: kworker/2:2 No contaminado 5.17.0-rc6-syzkaller-00226- g07ebd38a0da2 #0 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 01/04/2014 Cola de trabajo: usb_hub_wq hub_event ... Seguimiento de llamadas: aiptek_open+0xd5/0x130 drivers/input/ tableta/aiptek.c:830 input_open_device+0x1bb/0x320 controladores/input/input.c:629 kbd_connect+0xfe/0x160 controladores/tty/vt/keyboard.c:1593
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

16 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 13:15

Updated : 2024-11-21 07:34


NVD link : CVE-2022-48836

Mitre link : CVE-2022-48836

CVE.ORG link : CVE-2022-48836


JSON object : View

Products Affected

linux

  • linux_kernel