CVE-2022-48836

Source
https://cve.org/CVERecord?id=CVE-2022-48836
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48836.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48836
Downstream
Related
Published
2024-07-16T12:25:08.564Z
Modified
2026-04-11T12:43:05.639373Z
Summary
Input: aiptek - properly check endpoint type
Details

In the Linux kernel, the following vulnerability has been resolved:

Input: aiptek - properly check endpoint type

Syzbot reported warning in usbsubmiturb() which is caused by wrong endpoint type. There was a check for the number of endpoints, but not for the type of endpoint.

Fix it by replacing old desc.bNumEndpoints check with usbfindcommon_endpoints() helper for finding endpoints

Fail log:

usb 5-1: BOGUS urb xfer, pipe 1 != type 3 WARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usbsubmiturb+0xed2/0x18a0 drivers/usb/core/urb.c:502 Modules linked in: CPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 Workqueue: usbhubwq hubevent ... Call Trace: <TASK> aiptekopen+0xd5/0x130 drivers/input/tablet/aiptek.c:830 inputopendevice+0x1bb/0x320 drivers/input/input.c:629 kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48836.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8e20cf2bce122ce9262d6034ee5d5b76fbb92f96
Fixed
57277a8b5d881e02051ba9d7f6cb3f915c229821
Fixed
fc8033a55e2796d21e370260a784ac9fbb8305a6
Fixed
6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f
Fixed
e732b0412f8c603d1e998f3bff41b5e7d5c3914c
Fixed
f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a
Fixed
e762f57ff255af28236cd02ca9fc5c7e5a089d31
Fixed
35069e654bcab567ff8b9f0e68e1caf82c15dcd7
Fixed
5600f6986628dde8881734090588474f54a540a8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
90eb3c037fe3f0f25f01713a92725a8daa2b41f3
Last affected
a7c0ba06670f99c252d5bb74258dddbf50fef837

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48836.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.4.0
Fixed
4.9.308
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.273
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.236
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.187
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.108
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.31
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.17

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48836.json"