{"id":"CVE-2022-48836","summary":"Input: aiptek - properly check endpoint type","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: aiptek - properly check endpoint type\n\nSyzbot reported warning in usb_submit_urb() which is caused by wrong\nendpoint type. There was a check for the number of endpoints, but not\nfor the type of endpoint.\n\nFix it by replacing old desc.bNumEndpoints check with\nusb_find_common_endpoints() helper for finding endpoints\n\nFail log:\n\nusb 5-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nWorkqueue: usb_hub_wq hub_event\n...\nCall Trace:\n \u003cTASK\u003e\n aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830\n input_open_device+0x1bb/0x320 drivers/input/input.c:629\n kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593","modified":"2026-05-12T03:52:20.090715Z","published":"2024-07-16T12:25:08.564Z","related":["ALSA-2024:7000","ALSA-2024:7001","SUSE-SU-2024:2892-1","SUSE-SU-2024:2894-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2902-1","SUSE-SU-2024:2929-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2940-1","SUSE-SU-2024:2947-1","SUSE-SU-2024:3225-1","SUSE-SU-2024:3249-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48836.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5600f6986628dde8881734090588474f54a540a8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/57277a8b5d881e02051ba9d7f6cb3f915c229821"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e732b0412f8c603d1e998f3bff41b5e7d5c3914c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e762f57ff255af28236cd02ca9fc5c7e5a089d31"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fc8033a55e2796d21e370260a784ac9fbb8305a6"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48836.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48836"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8e20cf2bce122ce9262d6034ee5d5b76fbb92f96"},{"fixed":"57277a8b5d881e02051ba9d7f6cb3f915c229821"},{"fixed":"fc8033a55e2796d21e370260a784ac9fbb8305a6"},{"fixed":"6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f"},{"fixed":"e732b0412f8c603d1e998f3bff41b5e7d5c3914c"},{"fixed":"f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a"},{"fixed":"e762f57ff255af28236cd02ca9fc5c7e5a089d31"},{"fixed":"35069e654bcab567ff8b9f0e68e1caf82c15dcd7"},{"fixed":"5600f6986628dde8881734090588474f54a540a8"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"90eb3c037fe3f0f25f01713a92725a8daa2b41f3"},{"last_affected":"a7c0ba06670f99c252d5bb74258dddbf50fef837"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48836.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.4.0"},{"fixed":"4.9.308"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.273"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.236"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.187"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.108"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.31"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.16.17"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48836.json"}}],"schema_version":"1.7.5"}