CVE-2022-48834

Source
https://cve.org/CVERecord?id=CVE-2022-48834
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48834.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48834
Downstream
Related
Published
2024-07-16T12:25:07.249Z
Modified
2026-03-14T12:00:41.923927Z
Summary
usb: usbtmc: Fix bug in pipe direction for control transfers
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: usbtmc: Fix bug in pipe direction for control transfers

The syzbot fuzzer reported a minor bug in the usbtmc driver:

usb 5-1: BOGUS control dir, pipe 80001e80 doesn't match bRequestType 0 WARNING: CPU: 0 PID: 3813 at drivers/usb/core/urb.c:412 usbsubmiturb+0x13a5/0x1970 drivers/usb/core/urb.c:410 Modules linked in: CPU: 0 PID: 3813 Comm: syz-executor122 Not tainted 5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0 ... Call Trace: <TASK> usbstartwaiturb+0x113/0x530 drivers/usb/core/message.c:58 usbinternalcontrolmsg drivers/usb/core/message.c:102 [inline] usbcontrolmsg+0x2a5/0x4b0 drivers/usb/core/message.c:153 usbtmcioctlrequest drivers/usb/class/usbtmc.c:1947 [inline]

The problem is that usbtmcioctlrequest() uses usb_rcvctrlpipe() for all of its transfers, whether they are in or out. It's easy to fix.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48834.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
658f24f4523e41cda6a389c38b763f4c0cad6fbc
Fixed
700a0715854c1e79a73341724ce4f5bb01abc016
Fixed
10a805334a11acd547602d6c4cf540a0f6ab5c6e
Fixed
c69aef9db878ab277068a8cc1b4bf0cf309dc2b7
Fixed
5f6a2d63c68c12cf61259df7c3527a0e05dce952
Fixed
e9b667a82cdcfe21d590344447d65daed52b353b

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48834.json"