{"id":"CVE-2022-48834","summary":"usb: usbtmc: Fix bug in pipe direction for control transfers","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: usbtmc: Fix bug in pipe direction for control transfers\n\nThe syzbot fuzzer reported a minor bug in the usbtmc driver:\n\nusb 5-1: BOGUS control dir, pipe 80001e80 doesn't match bRequestType 0\nWARNING: CPU: 0 PID: 3813 at drivers/usb/core/urb.c:412\nusb_submit_urb+0x13a5/0x1970 drivers/usb/core/urb.c:410\nModules linked in:\nCPU: 0 PID: 3813 Comm: syz-executor122 Not tainted\n5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0\n...\nCall Trace:\n \u003cTASK\u003e\n usb_start_wait_urb+0x113/0x530 drivers/usb/core/message.c:58\n usb_internal_control_msg drivers/usb/core/message.c:102 [inline]\n usb_control_msg+0x2a5/0x4b0 drivers/usb/core/message.c:153\n usbtmc_ioctl_request drivers/usb/class/usbtmc.c:1947 [inline]\n\nThe problem is that usbtmc_ioctl_request() uses usb_rcvctrlpipe() for\nall of its transfers, whether they are in or out.  It's easy to fix.","modified":"2026-03-20T12:21:55.523132Z","published":"2024-07-16T12:25:07.249Z","related":["SUSE-SU-2024:2894-1","SUSE-SU-2024:2902-1","SUSE-SU-2024:2929-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2947-1","SUSE-SU-2024:3225-1","SUSE-SU-2024:3249-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48834.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/10a805334a11acd547602d6c4cf540a0f6ab5c6e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5f6a2d63c68c12cf61259df7c3527a0e05dce952"},{"type":"WEB","url":"https://git.kernel.org/stable/c/700a0715854c1e79a73341724ce4f5bb01abc016"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c69aef9db878ab277068a8cc1b4bf0cf309dc2b7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e9b667a82cdcfe21d590344447d65daed52b353b"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48834.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48834"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"658f24f4523e41cda6a389c38b763f4c0cad6fbc"},{"fixed":"700a0715854c1e79a73341724ce4f5bb01abc016"},{"fixed":"10a805334a11acd547602d6c4cf540a0f6ab5c6e"},{"fixed":"c69aef9db878ab277068a8cc1b4bf0cf309dc2b7"},{"fixed":"5f6a2d63c68c12cf61259df7c3527a0e05dce952"},{"fixed":"e9b667a82cdcfe21d590344447d65daed52b353b"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48834.json"}}],"schema_version":"1.7.5"}